Apr 12 18:52:45.959045 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:52:45.959066 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:45.959075 kernel: BIOS-provided physical RAM map: Apr 12 18:52:45.959081 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 18:52:45.959086 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 18:52:45.959093 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 18:52:45.959102 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Apr 12 18:52:45.959108 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Apr 12 18:52:45.959114 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Apr 12 18:52:45.959120 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 18:52:45.959126 kernel: NX (Execute Disable) protection: active Apr 12 18:52:45.959131 kernel: SMBIOS 2.7 present. Apr 12 18:52:45.959137 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Apr 12 18:52:45.959144 kernel: Hypervisor detected: KVM Apr 12 18:52:45.959153 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:52:45.959160 kernel: kvm-clock: cpu 0, msr 6d191001, primary cpu clock Apr 12 18:52:45.959167 kernel: kvm-clock: using sched offset of 7007581984 cycles Apr 12 18:52:45.959174 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:52:45.959181 kernel: tsc: Detected 2499.996 MHz processor Apr 12 18:52:45.959187 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:52:45.959197 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:52:45.959245 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Apr 12 18:52:45.959252 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:52:45.959259 kernel: Using GB pages for direct mapping Apr 12 18:52:45.959265 kernel: ACPI: Early table checksum verification disabled Apr 12 18:52:45.959272 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Apr 12 18:52:45.959279 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Apr 12 18:52:45.959285 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Apr 12 18:52:45.959292 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Apr 12 18:52:45.959301 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Apr 12 18:52:45.959308 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Apr 12 18:52:45.959314 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Apr 12 18:52:45.959321 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Apr 12 18:52:45.959328 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Apr 12 18:52:45.959334 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Apr 12 18:52:45.959341 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Apr 12 18:52:45.959347 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Apr 12 18:52:45.959356 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Apr 12 18:52:45.959362 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Apr 12 18:52:45.959369 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Apr 12 18:52:45.959379 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Apr 12 18:52:45.959386 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Apr 12 18:52:45.959393 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Apr 12 18:52:45.959401 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Apr 12 18:52:45.959409 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Apr 12 18:52:45.959417 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Apr 12 18:52:45.959424 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Apr 12 18:52:45.959431 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Apr 12 18:52:45.959438 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Apr 12 18:52:45.959445 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Apr 12 18:52:45.959452 kernel: NUMA: Initialized distance table, cnt=1 Apr 12 18:52:45.959459 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Apr 12 18:52:45.959468 kernel: Zone ranges: Apr 12 18:52:45.959475 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:52:45.959482 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Apr 12 18:52:45.959489 kernel: Normal empty Apr 12 18:52:45.959496 kernel: Movable zone start for each node Apr 12 18:52:45.959504 kernel: Early memory node ranges Apr 12 18:52:45.959543 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 18:52:45.959550 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Apr 12 18:52:45.959557 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Apr 12 18:52:45.959567 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:52:45.959574 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 18:52:45.959591 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Apr 12 18:52:45.959599 kernel: ACPI: PM-Timer IO Port: 0xb008 Apr 12 18:52:45.959606 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:52:45.959613 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Apr 12 18:52:45.959620 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:52:45.959627 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:52:45.959634 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:52:45.959643 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:52:45.959651 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:52:45.959658 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 18:52:45.959665 kernel: TSC deadline timer available Apr 12 18:52:45.959672 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 18:52:45.959679 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Apr 12 18:52:45.959686 kernel: Booting paravirtualized kernel on KVM Apr 12 18:52:45.959694 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:52:45.959701 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 18:52:45.959710 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 18:52:45.959717 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 18:52:45.959724 kernel: pcpu-alloc: [0] 0 1 Apr 12 18:52:45.959731 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Apr 12 18:52:45.959738 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:52:45.959745 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:52:45.959752 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Apr 12 18:52:45.959759 kernel: Policy zone: DMA32 Apr 12 18:52:45.959767 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:45.959776 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:52:45.959783 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:52:45.959790 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:52:45.959797 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:52:45.959805 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 123080K reserved, 0K cma-reserved) Apr 12 18:52:45.959812 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:52:45.959819 kernel: Kernel/User page tables isolation: enabled Apr 12 18:52:45.959827 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:52:45.959836 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:52:45.959843 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:52:45.959850 kernel: rcu: RCU event tracing is enabled. Apr 12 18:52:45.959857 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:52:45.959865 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:52:45.959872 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:52:45.959879 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:52:45.959886 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:52:45.959893 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 18:52:45.959900 kernel: random: crng init done Apr 12 18:52:45.959909 kernel: Console: colour VGA+ 80x25 Apr 12 18:52:45.959916 kernel: printk: console [ttyS0] enabled Apr 12 18:52:45.959923 kernel: ACPI: Core revision 20210730 Apr 12 18:52:45.959931 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Apr 12 18:52:45.959938 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:52:45.959945 kernel: x2apic enabled Apr 12 18:52:45.959952 kernel: Switched APIC routing to physical x2apic. Apr 12 18:52:45.959959 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Apr 12 18:52:45.959966 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Apr 12 18:52:45.959976 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 18:52:45.959983 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 18:52:45.959990 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:52:45.960004 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 18:52:45.960014 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:52:45.960021 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:52:45.960029 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Apr 12 18:52:45.960036 kernel: RETBleed: Vulnerable Apr 12 18:52:45.960043 kernel: Speculative Store Bypass: Vulnerable Apr 12 18:52:45.960051 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:52:45.960058 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:52:45.960065 kernel: GDS: Unknown: Dependent on hypervisor status Apr 12 18:52:45.960073 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:52:45.960082 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:52:45.960090 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:52:45.961345 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 18:52:45.961360 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 18:52:45.961368 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Apr 12 18:52:45.961375 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Apr 12 18:52:45.961386 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Apr 12 18:52:45.961394 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Apr 12 18:52:45.961402 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:52:45.961409 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 18:52:45.961417 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 18:52:45.961424 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Apr 12 18:52:45.961432 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Apr 12 18:52:45.961440 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Apr 12 18:52:45.961447 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Apr 12 18:52:45.961455 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Apr 12 18:52:45.961463 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:52:45.961472 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:52:45.961480 kernel: LSM: Security Framework initializing Apr 12 18:52:45.961487 kernel: SELinux: Initializing. Apr 12 18:52:45.961495 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:52:45.961502 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:52:45.961510 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8175M CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x4) Apr 12 18:52:45.961518 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Apr 12 18:52:45.961526 kernel: signal: max sigframe size: 3632 Apr 12 18:52:45.961534 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:52:45.961541 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 12 18:52:45.961549 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:52:45.961559 kernel: x86: Booting SMP configuration: Apr 12 18:52:45.961567 kernel: .... node #0, CPUs: #1 Apr 12 18:52:45.961574 kernel: kvm-clock: cpu 1, msr 6d191041, secondary cpu clock Apr 12 18:52:45.961593 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Apr 12 18:52:45.961601 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Apr 12 18:52:45.961609 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 18:52:45.961617 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:52:45.961624 kernel: smpboot: Max logical packages: 1 Apr 12 18:52:45.961634 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Apr 12 18:52:45.961642 kernel: devtmpfs: initialized Apr 12 18:52:45.961649 kernel: x86/mm: Memory block size: 128MB Apr 12 18:52:45.961657 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:52:45.961665 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:52:45.961673 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:52:45.961680 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:52:45.961688 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:52:45.961696 kernel: audit: type=2000 audit(1712947965.321:1): state=initialized audit_enabled=0 res=1 Apr 12 18:52:45.961705 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:52:45.961713 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:52:45.961721 kernel: cpuidle: using governor menu Apr 12 18:52:45.961728 kernel: ACPI: bus type PCI registered Apr 12 18:52:45.961736 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:52:45.961743 kernel: dca service started, version 1.12.1 Apr 12 18:52:45.961751 kernel: PCI: Using configuration type 1 for base access Apr 12 18:52:45.961759 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:52:45.961766 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:52:45.961776 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:52:45.961783 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:52:45.961791 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:52:45.961799 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:52:45.961806 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:52:45.961813 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:52:45.961821 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:52:45.962359 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:52:45.962370 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Apr 12 18:52:45.962381 kernel: ACPI: Interpreter enabled Apr 12 18:52:45.962389 kernel: ACPI: PM: (supports S0 S5) Apr 12 18:52:45.962397 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:52:45.962405 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:52:45.962413 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Apr 12 18:52:45.962421 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:52:45.962543 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:52:45.962661 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 18:52:45.962675 kernel: acpiphp: Slot [3] registered Apr 12 18:52:45.962683 kernel: acpiphp: Slot [4] registered Apr 12 18:52:45.962691 kernel: acpiphp: Slot [5] registered Apr 12 18:52:45.962698 kernel: acpiphp: Slot [6] registered Apr 12 18:52:45.962706 kernel: acpiphp: Slot [7] registered Apr 12 18:52:45.962713 kernel: acpiphp: Slot [8] registered Apr 12 18:52:45.962721 kernel: acpiphp: Slot [9] registered Apr 12 18:52:45.962728 kernel: acpiphp: Slot [10] registered Apr 12 18:52:45.962736 kernel: acpiphp: Slot [11] registered Apr 12 18:52:45.962746 kernel: acpiphp: Slot [12] registered Apr 12 18:52:45.962753 kernel: acpiphp: Slot [13] registered Apr 12 18:52:45.962761 kernel: acpiphp: Slot [14] registered Apr 12 18:52:45.962769 kernel: acpiphp: Slot [15] registered Apr 12 18:52:45.962776 kernel: acpiphp: Slot [16] registered Apr 12 18:52:45.962784 kernel: acpiphp: Slot [17] registered Apr 12 18:52:45.962791 kernel: acpiphp: Slot [18] registered Apr 12 18:52:45.962799 kernel: acpiphp: Slot [19] registered Apr 12 18:52:45.962806 kernel: acpiphp: Slot [20] registered Apr 12 18:52:45.962814 kernel: acpiphp: Slot [21] registered Apr 12 18:52:45.962823 kernel: acpiphp: Slot [22] registered Apr 12 18:52:45.962831 kernel: acpiphp: Slot [23] registered Apr 12 18:52:45.962839 kernel: acpiphp: Slot [24] registered Apr 12 18:52:45.962846 kernel: acpiphp: Slot [25] registered Apr 12 18:52:45.962854 kernel: acpiphp: Slot [26] registered Apr 12 18:52:45.962861 kernel: acpiphp: Slot [27] registered Apr 12 18:52:45.962869 kernel: acpiphp: Slot [28] registered Apr 12 18:52:45.962876 kernel: acpiphp: Slot [29] registered Apr 12 18:52:45.962883 kernel: acpiphp: Slot [30] registered Apr 12 18:52:45.962893 kernel: acpiphp: Slot [31] registered Apr 12 18:52:45.962900 kernel: PCI host bridge to bus 0000:00 Apr 12 18:52:45.962982 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:52:45.963053 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:52:45.963122 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:52:45.963190 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Apr 12 18:52:45.963259 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:52:45.974312 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:52:45.974430 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 18:52:45.974518 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Apr 12 18:52:45.974685 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Apr 12 18:52:45.974769 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Apr 12 18:52:45.974844 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Apr 12 18:52:45.974920 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Apr 12 18:52:45.974998 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Apr 12 18:52:45.975073 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Apr 12 18:52:45.975147 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Apr 12 18:52:45.975222 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Apr 12 18:52:45.979675 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Apr 12 18:52:45.979782 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Apr 12 18:52:45.979868 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Apr 12 18:52:45.979951 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:52:45.980032 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Apr 12 18:52:45.980109 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Apr 12 18:52:45.980192 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Apr 12 18:52:45.980268 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Apr 12 18:52:45.980278 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:52:45.980289 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:52:45.980297 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:52:45.980305 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:52:45.980313 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:52:45.980320 kernel: iommu: Default domain type: Translated Apr 12 18:52:45.980328 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:52:45.980403 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Apr 12 18:52:45.980478 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:52:45.980554 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Apr 12 18:52:45.980566 kernel: vgaarb: loaded Apr 12 18:52:45.980574 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:52:45.980594 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:52:45.980602 kernel: PTP clock support registered Apr 12 18:52:45.980610 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:52:45.980618 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:52:45.980626 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 18:52:45.980634 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Apr 12 18:52:45.980641 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Apr 12 18:52:45.980651 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Apr 12 18:52:45.980659 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:52:45.980667 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:52:45.980675 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:52:45.980683 kernel: pnp: PnP ACPI init Apr 12 18:52:45.980691 kernel: pnp: PnP ACPI: found 5 devices Apr 12 18:52:45.980698 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:52:45.980707 kernel: NET: Registered PF_INET protocol family Apr 12 18:52:45.980714 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:52:45.980725 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Apr 12 18:52:45.980733 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:52:45.980740 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:52:45.980748 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 18:52:45.980756 kernel: TCP: Hash tables configured (established 16384 bind 16384) Apr 12 18:52:45.980764 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:52:45.980772 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:52:45.980780 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:52:45.980789 kernel: NET: Registered PF_XDP protocol family Apr 12 18:52:45.980866 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:52:45.980938 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:52:45.981006 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:52:45.981075 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Apr 12 18:52:45.981155 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:52:45.981234 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 18:52:45.981245 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:52:45.981255 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 12 18:52:45.981263 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Apr 12 18:52:45.981271 kernel: clocksource: Switched to clocksource tsc Apr 12 18:52:45.981279 kernel: Initialise system trusted keyrings Apr 12 18:52:45.981287 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Apr 12 18:52:45.981295 kernel: Key type asymmetric registered Apr 12 18:52:45.981303 kernel: Asymmetric key parser 'x509' registered Apr 12 18:52:45.981311 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:52:45.981318 kernel: io scheduler mq-deadline registered Apr 12 18:52:45.981328 kernel: io scheduler kyber registered Apr 12 18:52:45.981336 kernel: io scheduler bfq registered Apr 12 18:52:45.981344 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:52:45.981352 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:52:45.981360 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:52:45.981368 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:52:45.981376 kernel: i8042: Warning: Keylock active Apr 12 18:52:45.981384 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:52:45.981391 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:52:45.981480 kernel: rtc_cmos 00:00: RTC can wake from S4 Apr 12 18:52:45.981552 kernel: rtc_cmos 00:00: registered as rtc0 Apr 12 18:52:45.981634 kernel: rtc_cmos 00:00: setting system clock to 2024-04-12T18:52:45 UTC (1712947965) Apr 12 18:52:45.981703 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Apr 12 18:52:45.981713 kernel: intel_pstate: CPU model not supported Apr 12 18:52:45.981721 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:52:45.981729 kernel: Segment Routing with IPv6 Apr 12 18:52:45.981739 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:52:45.981747 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:52:45.981755 kernel: Key type dns_resolver registered Apr 12 18:52:45.981762 kernel: IPI shorthand broadcast: enabled Apr 12 18:52:45.981770 kernel: sched_clock: Marking stable (412424610, 314724503)->(871119380, -143970267) Apr 12 18:52:45.981778 kernel: registered taskstats version 1 Apr 12 18:52:45.981786 kernel: Loading compiled-in X.509 certificates Apr 12 18:52:45.981794 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:52:45.981801 kernel: Key type .fscrypt registered Apr 12 18:52:45.981809 kernel: Key type fscrypt-provisioning registered Apr 12 18:52:45.981819 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:52:45.981827 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:52:45.981834 kernel: ima: No architecture policies found Apr 12 18:52:45.981843 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:52:45.981850 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:52:45.981866 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:52:45.981874 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:52:45.981882 kernel: Run /init as init process Apr 12 18:52:45.981892 kernel: with arguments: Apr 12 18:52:45.981900 kernel: /init Apr 12 18:52:45.981908 kernel: with environment: Apr 12 18:52:45.981915 kernel: HOME=/ Apr 12 18:52:45.981923 kernel: TERM=linux Apr 12 18:52:45.981931 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:52:45.981941 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:52:45.981951 systemd[1]: Detected virtualization amazon. Apr 12 18:52:45.981962 systemd[1]: Detected architecture x86-64. Apr 12 18:52:45.981969 systemd[1]: Running in initrd. Apr 12 18:52:45.981977 systemd[1]: No hostname configured, using default hostname. Apr 12 18:52:45.981985 systemd[1]: Hostname set to . Apr 12 18:52:45.982007 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:52:45.982016 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:52:45.982027 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:52:45.982035 systemd[1]: Reached target cryptsetup.target. Apr 12 18:52:45.982048 systemd[1]: Reached target paths.target. Apr 12 18:52:45.982057 systemd[1]: Reached target slices.target. Apr 12 18:52:45.982065 systemd[1]: Reached target swap.target. Apr 12 18:52:45.982074 systemd[1]: Reached target timers.target. Apr 12 18:52:45.982083 systemd[1]: Listening on iscsid.socket. Apr 12 18:52:45.982093 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:52:45.982102 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:52:45.982111 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:52:45.982119 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:52:45.982128 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:52:45.982136 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:52:45.982145 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:52:45.982153 systemd[1]: Reached target sockets.target. Apr 12 18:52:45.982162 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:52:45.982172 systemd[1]: Finished network-cleanup.service. Apr 12 18:52:45.982181 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:52:45.982189 systemd[1]: Starting systemd-journald.service... Apr 12 18:52:45.982198 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:52:45.982206 kernel: audit: type=1334 audit(1712947965.956:2): prog-id=6 op=LOAD Apr 12 18:52:45.982214 systemd[1]: Starting systemd-resolved.service... Apr 12 18:52:45.982223 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:52:45.982231 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:52:45.982240 kernel: audit: type=1130 audit(1712947965.976:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.982250 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:52:45.982264 systemd-journald[185]: Journal started Apr 12 18:52:45.982310 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2ad01d369a46bbf39ecdb51fb05650) is 4.8M, max 38.7M, 33.9M free. Apr 12 18:52:45.956000 audit: BPF prog-id=6 op=LOAD Apr 12 18:52:45.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.968473 systemd-modules-load[186]: Inserted module 'overlay' Apr 12 18:52:46.203785 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:52:46.203820 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:52:46.203840 kernel: Bridge firewalling registered Apr 12 18:52:46.203861 kernel: SCSI subsystem initialized Apr 12 18:52:46.203886 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:52:46.203913 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:52:46.203933 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:52:46.013636 systemd-modules-load[186]: Inserted module 'br_netfilter' Apr 12 18:52:46.212603 systemd[1]: Started systemd-journald.service. Apr 12 18:52:46.212640 kernel: audit: type=1130 audit(1712947966.204:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.014350 systemd-resolved[187]: Positive Trust Anchors: Apr 12 18:52:46.221756 kernel: audit: type=1130 audit(1712947966.213:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.014362 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:52:46.238011 kernel: audit: type=1130 audit(1712947966.220:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.014393 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:52:46.250660 kernel: audit: type=1130 audit(1712947966.236:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.021993 systemd-resolved[187]: Defaulting to hostname 'linux'. Apr 12 18:52:46.259311 kernel: audit: type=1130 audit(1712947966.250:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.047661 systemd-modules-load[186]: Inserted module 'dm_multipath' Apr 12 18:52:46.215088 systemd[1]: Started systemd-resolved.service. Apr 12 18:52:46.222021 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:52:46.238327 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:52:46.252327 systemd[1]: Reached target nss-lookup.target. Apr 12 18:52:46.265544 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:52:46.274798 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:52:46.275867 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:52:46.288837 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:52:46.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.295609 kernel: audit: type=1130 audit(1712947966.287:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.299144 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:52:46.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.305604 kernel: audit: type=1130 audit(1712947966.297:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.312909 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:52:46.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.315996 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:52:46.326834 dracut-cmdline[208]: dracut-dracut-053 Apr 12 18:52:46.329492 dracut-cmdline[208]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:46.393607 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:52:46.411613 kernel: iscsi: registered transport (tcp) Apr 12 18:52:46.436623 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:52:46.436702 kernel: QLogic iSCSI HBA Driver Apr 12 18:52:46.468623 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:52:46.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.469945 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:52:46.520633 kernel: raid6: avx512x4 gen() 17724 MB/s Apr 12 18:52:46.538621 kernel: raid6: avx512x4 xor() 7087 MB/s Apr 12 18:52:46.556629 kernel: raid6: avx512x2 gen() 17534 MB/s Apr 12 18:52:46.574614 kernel: raid6: avx512x2 xor() 25973 MB/s Apr 12 18:52:46.592620 kernel: raid6: avx512x1 gen() 18016 MB/s Apr 12 18:52:46.610648 kernel: raid6: avx512x1 xor() 23111 MB/s Apr 12 18:52:46.628646 kernel: raid6: avx2x4 gen() 13706 MB/s Apr 12 18:52:46.646625 kernel: raid6: avx2x4 xor() 7686 MB/s Apr 12 18:52:46.664608 kernel: raid6: avx2x2 gen() 17888 MB/s Apr 12 18:52:46.682614 kernel: raid6: avx2x2 xor() 17980 MB/s Apr 12 18:52:46.700637 kernel: raid6: avx2x1 gen() 13505 MB/s Apr 12 18:52:46.718648 kernel: raid6: avx2x1 xor() 15007 MB/s Apr 12 18:52:46.736641 kernel: raid6: sse2x4 gen() 9861 MB/s Apr 12 18:52:46.754625 kernel: raid6: sse2x4 xor() 6191 MB/s Apr 12 18:52:46.772620 kernel: raid6: sse2x2 gen() 11074 MB/s Apr 12 18:52:46.790631 kernel: raid6: sse2x2 xor() 6308 MB/s Apr 12 18:52:46.808613 kernel: raid6: sse2x1 gen() 10110 MB/s Apr 12 18:52:46.827293 kernel: raid6: sse2x1 xor() 4359 MB/s Apr 12 18:52:46.827376 kernel: raid6: using algorithm avx512x1 gen() 18016 MB/s Apr 12 18:52:46.827401 kernel: raid6: .... xor() 23111 MB/s, rmw enabled Apr 12 18:52:46.828822 kernel: raid6: using avx512x2 recovery algorithm Apr 12 18:52:46.844613 kernel: xor: automatically using best checksumming function avx Apr 12 18:52:46.946615 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:52:46.955168 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:52:46.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.956000 audit: BPF prog-id=7 op=LOAD Apr 12 18:52:46.956000 audit: BPF prog-id=8 op=LOAD Apr 12 18:52:46.958335 systemd[1]: Starting systemd-udevd.service... Apr 12 18:52:46.973464 systemd-udevd[385]: Using default interface naming scheme 'v252'. Apr 12 18:52:46.979256 systemd[1]: Started systemd-udevd.service. Apr 12 18:52:46.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.985219 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:52:47.002751 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Apr 12 18:52:47.037783 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:52:47.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:47.041481 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:52:47.085835 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:52:47.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:47.144646 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:52:47.167703 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:52:47.171948 kernel: AES CTR mode by8 optimization enabled Apr 12 18:52:47.183515 kernel: ena 0000:00:05.0: ENA device version: 0.10 Apr 12 18:52:47.183852 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Apr 12 18:52:47.190612 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Apr 12 18:52:47.192428 kernel: nvme nvme0: pci function 0000:00:04.0 Apr 12 18:52:47.193736 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Apr 12 18:52:47.194601 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:e4:0d:6f:a3:41 Apr 12 18:52:47.201605 kernel: nvme nvme0: 2/0/0 default/read/poll queues Apr 12 18:52:47.207603 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:52:47.207654 kernel: GPT:9289727 != 16777215 Apr 12 18:52:47.207676 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:52:47.207696 kernel: GPT:9289727 != 16777215 Apr 12 18:52:47.207714 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:52:47.207737 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:47.209168 (udev-worker)[431]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:52:47.422842 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (439) Apr 12 18:52:47.342028 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:52:47.431209 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:52:47.447668 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:52:47.453201 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:52:47.453303 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:52:47.466939 systemd[1]: Starting disk-uuid.service... Apr 12 18:52:47.472276 disk-uuid[593]: Primary Header is updated. Apr 12 18:52:47.472276 disk-uuid[593]: Secondary Entries is updated. Apr 12 18:52:47.472276 disk-uuid[593]: Secondary Header is updated. Apr 12 18:52:47.481599 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:47.487976 kernel: GPT:disk_guids don't match. Apr 12 18:52:47.488018 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:52:47.488030 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:47.497648 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:48.494619 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:48.495211 disk-uuid[594]: The operation has completed successfully. Apr 12 18:52:48.629162 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:52:48.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.629271 systemd[1]: Finished disk-uuid.service. Apr 12 18:52:48.640493 systemd[1]: Starting verity-setup.service... Apr 12 18:52:48.668608 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 18:52:48.730266 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:52:48.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.733636 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:52:48.735077 systemd[1]: Finished verity-setup.service. Apr 12 18:52:48.824620 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:52:48.824688 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:52:48.825009 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:52:48.827144 systemd[1]: Starting ignition-setup.service... Apr 12 18:52:48.836568 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:52:48.851132 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:52:48.851198 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:52:48.851220 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:52:48.859612 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:52:48.872743 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:52:48.909885 systemd[1]: Finished ignition-setup.service. Apr 12 18:52:48.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.917912 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:52:48.953650 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:52:48.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.954000 audit: BPF prog-id=9 op=LOAD Apr 12 18:52:48.956997 systemd[1]: Starting systemd-networkd.service... Apr 12 18:52:48.992949 systemd-networkd[1105]: lo: Link UP Apr 12 18:52:48.993309 systemd-networkd[1105]: lo: Gained carrier Apr 12 18:52:48.996649 systemd-networkd[1105]: Enumeration completed Apr 12 18:52:48.996965 systemd[1]: Started systemd-networkd.service. Apr 12 18:52:48.997359 systemd-networkd[1105]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:52:49.004067 systemd[1]: Reached target network.target. Apr 12 18:52:49.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.006937 systemd[1]: Starting iscsiuio.service... Apr 12 18:52:49.015451 systemd-networkd[1105]: eth0: Link UP Apr 12 18:52:49.016789 systemd[1]: Started iscsiuio.service. Apr 12 18:52:49.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.017700 systemd-networkd[1105]: eth0: Gained carrier Apr 12 18:52:49.020542 systemd[1]: Starting iscsid.service... Apr 12 18:52:49.026734 iscsid[1110]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:52:49.026734 iscsid[1110]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:52:49.026734 iscsid[1110]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:52:49.026734 iscsid[1110]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:52:49.026734 iscsid[1110]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:52:49.026734 iscsid[1110]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:52:49.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.029327 systemd[1]: Started iscsid.service. Apr 12 18:52:49.032441 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:52:49.059722 systemd-networkd[1105]: eth0: DHCPv4 address 172.31.22.226/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:52:49.065261 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:52:49.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.066797 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:52:49.068039 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:52:49.070435 systemd[1]: Reached target remote-fs.target. Apr 12 18:52:49.072846 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:52:49.088336 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:52:49.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.311862 ignition[1058]: Ignition 2.14.0 Apr 12 18:52:49.311878 ignition[1058]: Stage: fetch-offline Apr 12 18:52:49.312013 ignition[1058]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:49.312067 ignition[1058]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:49.326828 ignition[1058]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:49.327234 ignition[1058]: Ignition finished successfully Apr 12 18:52:49.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.329113 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:52:49.332526 systemd[1]: Starting ignition-fetch.service... Apr 12 18:52:49.343811 ignition[1129]: Ignition 2.14.0 Apr 12 18:52:49.343824 ignition[1129]: Stage: fetch Apr 12 18:52:49.344011 ignition[1129]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:49.344041 ignition[1129]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:49.364845 ignition[1129]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:49.372003 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:49.399817 ignition[1129]: INFO : PUT result: OK Apr 12 18:52:49.409608 ignition[1129]: DEBUG : parsed url from cmdline: "" Apr 12 18:52:49.409608 ignition[1129]: INFO : no config URL provided Apr 12 18:52:49.409608 ignition[1129]: INFO : reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:52:49.417747 ignition[1129]: INFO : no config at "/usr/lib/ignition/user.ign" Apr 12 18:52:49.417747 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:49.417747 ignition[1129]: INFO : PUT result: OK Apr 12 18:52:49.422349 ignition[1129]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Apr 12 18:52:49.424756 ignition[1129]: INFO : GET result: OK Apr 12 18:52:49.426025 ignition[1129]: DEBUG : parsing config with SHA512: 9e7bd2d9ff308d3809b84f83e6a1ec507ca0ec7f2fe2c1acd3fc5c0c9e771f6d65960b0b5af3bba8d68dafb46c6d97650c6347d62cef23a7db3d99597d368e32 Apr 12 18:52:49.468875 unknown[1129]: fetched base config from "system" Apr 12 18:52:49.469056 unknown[1129]: fetched base config from "system" Apr 12 18:52:49.469063 unknown[1129]: fetched user config from "aws" Apr 12 18:52:49.473681 ignition[1129]: fetch: fetch complete Apr 12 18:52:49.473692 ignition[1129]: fetch: fetch passed Apr 12 18:52:49.473747 ignition[1129]: Ignition finished successfully Apr 12 18:52:49.478210 systemd[1]: Finished ignition-fetch.service. Apr 12 18:52:49.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.480469 systemd[1]: Starting ignition-kargs.service... Apr 12 18:52:49.492455 ignition[1135]: Ignition 2.14.0 Apr 12 18:52:49.492465 ignition[1135]: Stage: kargs Apr 12 18:52:49.492616 ignition[1135]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:49.492638 ignition[1135]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:49.502148 ignition[1135]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:49.504038 ignition[1135]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:49.506049 ignition[1135]: INFO : PUT result: OK Apr 12 18:52:49.510898 ignition[1135]: kargs: kargs passed Apr 12 18:52:49.510957 ignition[1135]: Ignition finished successfully Apr 12 18:52:49.513796 systemd[1]: Finished ignition-kargs.service. Apr 12 18:52:49.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.517305 systemd[1]: Starting ignition-disks.service... Apr 12 18:52:49.525461 ignition[1141]: Ignition 2.14.0 Apr 12 18:52:49.525616 ignition[1141]: Stage: disks Apr 12 18:52:49.526648 ignition[1141]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:49.526693 ignition[1141]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:49.534901 ignition[1141]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:49.536832 ignition[1141]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:49.539365 ignition[1141]: INFO : PUT result: OK Apr 12 18:52:49.542756 ignition[1141]: disks: disks passed Apr 12 18:52:49.542801 ignition[1141]: Ignition finished successfully Apr 12 18:52:49.543899 systemd[1]: Finished ignition-disks.service. Apr 12 18:52:49.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.548137 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:52:49.548246 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:52:49.552120 systemd[1]: Reached target local-fs.target. Apr 12 18:52:49.554645 systemd[1]: Reached target sysinit.target. Apr 12 18:52:49.554731 systemd[1]: Reached target basic.target. Apr 12 18:52:49.559601 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:52:49.579539 systemd-fsck[1149]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 18:52:49.584697 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:52:49.588064 systemd[1]: Mounting sysroot.mount... Apr 12 18:52:49.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.610623 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:52:49.610807 systemd[1]: Mounted sysroot.mount. Apr 12 18:52:49.610988 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:52:49.626015 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:52:49.629294 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:52:49.629737 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:52:49.629777 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:52:49.639377 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:52:49.640737 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:52:49.655652 initrd-setup-root[1170]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:52:49.673020 initrd-setup-root[1178]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:52:49.678793 initrd-setup-root[1186]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:52:49.684511 initrd-setup-root[1194]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:52:49.753610 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:52:49.769612 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1202) Apr 12 18:52:49.774769 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:52:49.774906 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:52:49.774932 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:52:49.782611 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:52:49.785095 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:52:49.795332 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:52:49.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.798678 systemd[1]: Starting ignition-mount.service... Apr 12 18:52:49.803778 systemd[1]: Starting sysroot-boot.service... Apr 12 18:52:49.812001 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:52:49.812128 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:52:49.836738 ignition[1232]: INFO : Ignition 2.14.0 Apr 12 18:52:49.838475 ignition[1232]: INFO : Stage: mount Apr 12 18:52:49.838475 ignition[1232]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:49.838475 ignition[1232]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:49.850112 systemd[1]: Finished sysroot-boot.service. Apr 12 18:52:49.852799 ignition[1232]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:49.852799 ignition[1232]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:49.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.856858 ignition[1232]: INFO : PUT result: OK Apr 12 18:52:49.860239 ignition[1232]: INFO : mount: mount passed Apr 12 18:52:49.861393 ignition[1232]: INFO : Ignition finished successfully Apr 12 18:52:49.863489 systemd[1]: Finished ignition-mount.service. Apr 12 18:52:49.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.865376 systemd[1]: Starting ignition-files.service... Apr 12 18:52:49.875435 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:52:49.889627 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1241) Apr 12 18:52:49.892611 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:52:49.892674 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:52:49.895773 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:52:49.901604 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:52:49.904448 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:52:49.915956 ignition[1260]: INFO : Ignition 2.14.0 Apr 12 18:52:49.915956 ignition[1260]: INFO : Stage: files Apr 12 18:52:49.918659 ignition[1260]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:49.918659 ignition[1260]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:49.928922 ignition[1260]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:49.930746 ignition[1260]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:49.932988 ignition[1260]: INFO : PUT result: OK Apr 12 18:52:49.937159 ignition[1260]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:52:49.941438 ignition[1260]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:52:49.941438 ignition[1260]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:52:49.955914 ignition[1260]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:52:49.958279 ignition[1260]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:52:49.960856 unknown[1260]: wrote ssh authorized keys file for user: core Apr 12 18:52:49.962543 ignition[1260]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:52:49.965149 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:52:49.970796 ignition[1260]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:52:50.415681 ignition[1260]: INFO : GET result: OK Apr 12 18:52:50.673810 systemd-networkd[1105]: eth0: Gained IPv6LL Apr 12 18:52:50.745555 ignition[1260]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:52:50.750494 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:52:50.750494 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:52:50.750494 ignition[1260]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:52:50.798685 ignition[1260]: INFO : GET result: OK Apr 12 18:52:50.970826 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:52:50.970826 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:52:50.981120 ignition[1260]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:52:51.371814 ignition[1260]: INFO : GET result: OK Apr 12 18:52:51.510348 ignition[1260]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:52:51.513907 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:52:51.513907 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:52:51.513907 ignition[1260]: INFO : GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:52:51.621741 ignition[1260]: INFO : GET result: OK Apr 12 18:52:51.922089 ignition[1260]: DEBUG : file matches expected sum of: a2de71807eb4c41f4d70e5c47fac72ecf3c74984be6c08be0597fc58621baeeddc1b5cc6431ab007eee9bd0a98f8628dd21512b06daaeccfac5837e9792a98a7 Apr 12 18:52:51.926398 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:52:51.926398 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:52:51.926398 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:52:51.942492 ignition[1260]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3177207658" Apr 12 18:52:51.952620 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1262) Apr 12 18:52:51.952666 ignition[1260]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3177207658": device or resource busy Apr 12 18:52:51.952666 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3177207658", trying btrfs: device or resource busy Apr 12 18:52:51.952666 ignition[1260]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3177207658" Apr 12 18:52:51.952666 ignition[1260]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3177207658" Apr 12 18:52:51.970004 ignition[1260]: INFO : op(3): [started] unmounting "/mnt/oem3177207658" Apr 12 18:52:51.971841 systemd[1]: mnt-oem3177207658.mount: Deactivated successfully. Apr 12 18:52:51.973899 ignition[1260]: INFO : op(3): [finished] unmounting "/mnt/oem3177207658" Apr 12 18:52:51.975810 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:52:51.975810 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:52:51.975810 ignition[1260]: INFO : GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:52:52.191000 ignition[1260]: INFO : GET result: OK Apr 12 18:52:58.800824 ignition[1260]: DEBUG : file matches expected sum of: 4261cb0319688a0557b3052cce8df9d754abc38d5fc8e0eeeb63a85a2194895fdca5bad464f8516459ed7b1764d7bbb2304f5f434d42bb35f38764b4b00ce663 Apr 12 18:52:58.805127 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:52:58.805127 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:52:58.805127 ignition[1260]: INFO : GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:52:59.039312 ignition[1260]: INFO : GET result: OK Apr 12 18:53:13.868857 ignition[1260]: DEBUG : file matches expected sum of: d3fef1d4b99415179ecb94d4de953bddb74c0fb0f798265829b899bb031e2ab8c2b60037b79a66405a9b102d3db0d90e9257595f4b11660356de0e2e63744cd7 Apr 12 18:53:13.874905 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:53:13.874905 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:53:13.874905 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:53:13.874905 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:53:13.914693 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:53:13.914693 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:53:13.914693 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:53:13.914693 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:53:13.914693 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:53:13.946307 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:53:13.946307 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:53:13.946307 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:53:13.946307 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:53:13.946307 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:53:13.960089 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:53:13.965656 ignition[1260]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1173316747" Apr 12 18:53:13.968717 ignition[1260]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1173316747": device or resource busy Apr 12 18:53:13.968717 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1173316747", trying btrfs: device or resource busy Apr 12 18:53:13.968717 ignition[1260]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1173316747" Apr 12 18:53:13.968717 ignition[1260]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1173316747" Apr 12 18:53:13.968717 ignition[1260]: INFO : op(6): [started] unmounting "/mnt/oem1173316747" Apr 12 18:53:13.968717 ignition[1260]: INFO : op(6): [finished] unmounting "/mnt/oem1173316747" Apr 12 18:53:13.968717 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:53:13.968717 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:53:13.993975 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:53:13.972693 systemd[1]: mnt-oem1173316747.mount: Deactivated successfully. Apr 12 18:53:13.997851 ignition[1260]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem535080695" Apr 12 18:53:13.997851 ignition[1260]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem535080695": device or resource busy Apr 12 18:53:13.997851 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem535080695", trying btrfs: device or resource busy Apr 12 18:53:13.997851 ignition[1260]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem535080695" Apr 12 18:53:13.997851 ignition[1260]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem535080695" Apr 12 18:53:13.997851 ignition[1260]: INFO : op(9): [started] unmounting "/mnt/oem535080695" Apr 12 18:53:14.012449 ignition[1260]: INFO : op(9): [finished] unmounting "/mnt/oem535080695" Apr 12 18:53:14.012449 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:53:14.012449 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:53:14.012449 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:53:14.022328 ignition[1260]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem515099291" Apr 12 18:53:14.024385 ignition[1260]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem515099291": device or resource busy Apr 12 18:53:14.024385 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem515099291", trying btrfs: device or resource busy Apr 12 18:53:14.024385 ignition[1260]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem515099291" Apr 12 18:53:14.031199 ignition[1260]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem515099291" Apr 12 18:53:14.031199 ignition[1260]: INFO : op(c): [started] unmounting "/mnt/oem515099291" Apr 12 18:53:14.031199 ignition[1260]: INFO : op(c): [finished] unmounting "/mnt/oem515099291" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(13): [started] processing unit "amazon-ssm-agent.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(13): op(14): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(13): op(14): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(13): [finished] processing unit "amazon-ssm-agent.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(15): [started] processing unit "nvidia.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(15): [finished] processing unit "nvidia.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(16): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(16): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:53:14.031199 ignition[1260]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1e): [started] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1e): [finished] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1f): [started] setting preset to enabled for "nvidia.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(1f): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(21): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(22): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:53:14.074541 ignition[1260]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:53:14.114202 ignition[1260]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:53:14.116900 ignition[1260]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:53:14.116900 ignition[1260]: INFO : files: files passed Apr 12 18:53:14.116900 ignition[1260]: INFO : Ignition finished successfully Apr 12 18:53:14.122395 systemd[1]: Finished ignition-files.service. Apr 12 18:53:14.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.134102 kernel: kauditd_printk_skb: 27 callbacks suppressed Apr 12 18:53:14.134155 kernel: audit: type=1130 audit(1712947994.122:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.134011 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:53:14.135791 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:53:14.136942 systemd[1]: Starting ignition-quench.service... Apr 12 18:53:14.144093 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:53:14.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.144216 systemd[1]: Finished ignition-quench.service. Apr 12 18:53:14.160544 kernel: audit: type=1130 audit(1712947994.145:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.160657 kernel: audit: type=1131 audit(1712947994.145:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.160799 initrd-setup-root-after-ignition[1285]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:53:14.156898 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:53:14.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.166014 systemd[1]: Reached target ignition-complete.target. Apr 12 18:53:14.174058 kernel: audit: type=1130 audit(1712947994.164:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.174919 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:53:14.218527 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:53:14.218669 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:53:14.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.223303 systemd[1]: Reached target initrd-fs.target. Apr 12 18:53:14.235246 kernel: audit: type=1130 audit(1712947994.222:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.235279 kernel: audit: type=1131 audit(1712947994.222:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.237594 systemd[1]: Reached target initrd.target. Apr 12 18:53:14.238993 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:53:14.240307 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:53:14.261812 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:53:14.269569 kernel: audit: type=1130 audit(1712947994.260:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.269614 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:53:14.279940 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:53:14.282107 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:53:14.285204 systemd[1]: Stopped target timers.target. Apr 12 18:53:14.288408 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:53:14.289775 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:53:14.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.292127 systemd[1]: Stopped target initrd.target. Apr 12 18:53:14.302213 kernel: audit: type=1131 audit(1712947994.290:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.302303 systemd[1]: Stopped target basic.target. Apr 12 18:53:14.305897 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:53:14.308326 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:53:14.310517 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:53:14.312990 systemd[1]: Stopped target remote-fs.target. Apr 12 18:53:14.315433 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:53:14.318813 systemd[1]: Stopped target sysinit.target. Apr 12 18:53:14.320961 systemd[1]: Stopped target local-fs.target. Apr 12 18:53:14.323087 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:53:14.325432 systemd[1]: Stopped target swap.target. Apr 12 18:53:14.327438 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:53:14.328912 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:53:14.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.331972 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:53:14.337604 kernel: audit: type=1131 audit(1712947994.330:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.339605 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:53:14.339794 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:53:14.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.343307 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:53:14.351531 kernel: audit: type=1131 audit(1712947994.341:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.343686 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:53:14.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.352971 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:53:14.355457 systemd[1]: Stopped ignition-files.service. Apr 12 18:53:14.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.358792 systemd[1]: Stopping ignition-mount.service... Apr 12 18:53:14.370790 systemd[1]: Stopping iscsiuio.service... Apr 12 18:53:14.375056 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:53:14.377991 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:53:14.380293 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:53:14.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.383618 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:53:14.385707 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:53:14.388339 ignition[1298]: INFO : Ignition 2.14.0 Apr 12 18:53:14.388339 ignition[1298]: INFO : Stage: umount Apr 12 18:53:14.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.390933 ignition[1298]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:53:14.390933 ignition[1298]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:53:14.400034 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:53:14.400170 systemd[1]: Stopped iscsiuio.service. Apr 12 18:53:14.412301 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:53:14.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.415737 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:53:14.415985 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:53:14.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.424684 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:53:14.427318 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:53:14.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.431492 ignition[1298]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:53:14.433412 ignition[1298]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:53:14.437358 ignition[1298]: INFO : PUT result: OK Apr 12 18:53:14.443167 ignition[1298]: INFO : umount: umount passed Apr 12 18:53:14.444814 ignition[1298]: INFO : Ignition finished successfully Apr 12 18:53:14.447122 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:53:14.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.447214 systemd[1]: Stopped ignition-mount.service. Apr 12 18:53:14.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.448748 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:53:14.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.448790 systemd[1]: Stopped ignition-disks.service. Apr 12 18:53:14.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.451654 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:53:14.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.451694 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:53:14.454087 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:53:14.454124 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:53:14.456803 systemd[1]: Stopped target network.target. Apr 12 18:53:14.458195 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:53:14.458242 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:53:14.460838 systemd[1]: Stopped target paths.target. Apr 12 18:53:14.463505 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:53:14.466825 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:53:14.470605 systemd[1]: Stopped target slices.target. Apr 12 18:53:14.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.472736 systemd[1]: Stopped target sockets.target. Apr 12 18:53:14.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.476985 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:53:14.477024 systemd[1]: Closed iscsid.socket. Apr 12 18:53:14.479167 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:53:14.479206 systemd[1]: Closed iscsiuio.socket. Apr 12 18:53:14.481956 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:53:14.482006 systemd[1]: Stopped ignition-setup.service. Apr 12 18:53:14.484421 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:53:14.484461 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:53:14.486702 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:53:14.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.491166 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:53:14.494436 systemd-networkd[1105]: eth0: DHCPv6 lease lost Apr 12 18:53:14.499254 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:53:14.499352 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:53:14.505925 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:53:14.510334 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:53:14.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.515000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:53:14.513224 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:53:14.513257 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:53:14.528000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:53:14.535850 systemd[1]: Stopping network-cleanup.service... Apr 12 18:53:14.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.537362 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:53:14.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.537441 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:53:14.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.541875 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:53:14.541945 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:53:14.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.545913 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:53:14.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.545974 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:53:14.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.547560 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:53:14.553484 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:53:14.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.553804 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:53:14.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.556763 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:53:14.556818 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:53:14.558731 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:53:14.558763 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:53:14.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.562000 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:53:14.562074 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:53:14.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.565157 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:53:14.565214 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:53:14.566488 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:53:14.566550 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:53:14.571332 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:53:14.573018 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:53:14.573085 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:53:14.576185 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:53:14.576243 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:53:14.582488 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:53:14.582557 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:53:14.585218 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:53:14.585346 systemd[1]: Stopped network-cleanup.service. Apr 12 18:53:14.587709 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:53:14.587820 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:53:14.589844 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:53:14.593844 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:53:14.634509 systemd[1]: Switching root. Apr 12 18:53:14.660625 iscsid[1110]: iscsid shutting down. Apr 12 18:53:14.664199 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Apr 12 18:53:14.664265 systemd-journald[185]: Journal stopped Apr 12 18:53:17.992306 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:53:17.992389 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:53:17.992418 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:53:17.992440 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:53:17.992460 kernel: SELinux: policy capability open_perms=1 Apr 12 18:53:17.992495 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:53:17.992522 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:53:17.992548 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:53:17.992569 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:53:17.992608 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:53:17.992629 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:53:17.992653 systemd[1]: Successfully loaded SELinux policy in 59.788ms. Apr 12 18:53:17.992684 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.312ms. Apr 12 18:53:17.992711 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:53:17.992735 systemd[1]: Detected virtualization amazon. Apr 12 18:53:17.992758 systemd[1]: Detected architecture x86-64. Apr 12 18:53:17.992780 systemd[1]: Detected first boot. Apr 12 18:53:17.992807 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:53:17.992830 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:53:17.992852 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:53:17.992875 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:17.992903 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:17.992933 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:17.992957 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:53:17.992979 systemd[1]: Stopped iscsid.service. Apr 12 18:53:17.993001 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:53:17.993023 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:53:17.993045 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:53:17.993067 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:53:17.993094 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:53:17.993117 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:53:17.993140 systemd[1]: Created slice system-getty.slice. Apr 12 18:53:17.993162 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:53:17.993184 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:53:17.993207 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:53:17.993228 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:53:17.998640 systemd[1]: Created slice user.slice. Apr 12 18:53:17.998688 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:53:17.998712 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:53:17.998730 systemd[1]: Set up automount boot.automount. Apr 12 18:53:17.998750 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:53:17.998769 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:53:17.998790 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:53:17.998810 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:53:17.998827 systemd[1]: Reached target integritysetup.target. Apr 12 18:53:17.998849 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:53:17.998868 systemd[1]: Reached target remote-fs.target. Apr 12 18:53:17.998886 systemd[1]: Reached target slices.target. Apr 12 18:53:17.998905 systemd[1]: Reached target swap.target. Apr 12 18:53:17.998926 systemd[1]: Reached target torcx.target. Apr 12 18:53:17.998949 systemd[1]: Reached target veritysetup.target. Apr 12 18:53:17.998973 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:53:17.999016 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:53:17.999043 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:53:17.999068 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:53:17.999091 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:53:17.999113 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:53:17.999136 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:53:17.999158 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:53:17.999180 systemd[1]: Mounting media.mount... Apr 12 18:53:17.999205 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:53:17.999228 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:53:17.999252 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:53:17.999275 systemd[1]: Mounting tmp.mount... Apr 12 18:53:17.999298 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:53:17.999324 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:53:17.999347 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:53:17.999370 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:53:17.999391 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:53:17.999416 systemd[1]: Starting modprobe@drm.service... Apr 12 18:53:17.999439 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:53:17.999462 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:53:17.999484 systemd[1]: Starting modprobe@loop.service... Apr 12 18:53:17.999506 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:53:17.999529 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:53:17.999557 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:53:17.999598 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:53:17.999623 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:53:17.999648 systemd[1]: Stopped systemd-journald.service. Apr 12 18:53:17.999670 kernel: loop: module loaded Apr 12 18:53:17.999693 systemd[1]: Starting systemd-journald.service... Apr 12 18:53:17.999716 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:53:17.999739 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:53:17.999761 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:53:17.999784 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:53:17.999805 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:53:17.999828 systemd[1]: Stopped verity-setup.service. Apr 12 18:53:17.999854 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:53:17.999875 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:53:17.999899 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:53:17.999920 systemd[1]: Mounted media.mount. Apr 12 18:53:17.999943 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:53:17.999965 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:53:17.999986 kernel: fuse: init (API version 7.34) Apr 12 18:53:18.000008 systemd[1]: Mounted tmp.mount. Apr 12 18:53:18.000030 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:53:18.000056 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:53:18.000077 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:53:18.000100 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:53:18.000125 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:53:18.000147 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:53:18.000171 systemd[1]: Finished modprobe@drm.service. Apr 12 18:53:18.000195 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:53:18.000216 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:53:18.000238 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:53:18.000261 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:53:18.000284 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:53:18.000306 systemd[1]: Finished modprobe@loop.service. Apr 12 18:53:18.000334 systemd-journald[1414]: Journal started Apr 12 18:53:18.000421 systemd-journald[1414]: Runtime Journal (/run/log/journal/ec2ad01d369a46bbf39ecdb51fb05650) is 4.8M, max 38.7M, 33.9M free. Apr 12 18:53:14.891000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:53:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:53:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:53:14.967000 audit: BPF prog-id=10 op=LOAD Apr 12 18:53:14.967000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:53:14.967000 audit: BPF prog-id=11 op=LOAD Apr 12 18:53:14.967000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:53:15.125000 audit[1331]: AVC avc: denied { associate } for pid=1331 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:53:15.125000 audit[1331]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1314 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:15.125000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:53:15.128000 audit[1331]: AVC avc: denied { associate } for pid=1331 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:53:15.128000 audit[1331]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1314 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:15.128000 audit: CWD cwd="/" Apr 12 18:53:15.128000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:15.128000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:15.128000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:53:17.650000 audit: BPF prog-id=12 op=LOAD Apr 12 18:53:17.650000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:53:17.650000 audit: BPF prog-id=13 op=LOAD Apr 12 18:53:17.650000 audit: BPF prog-id=14 op=LOAD Apr 12 18:53:17.650000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:53:17.650000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:53:17.651000 audit: BPF prog-id=15 op=LOAD Apr 12 18:53:17.651000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:53:17.651000 audit: BPF prog-id=16 op=LOAD Apr 12 18:53:17.651000 audit: BPF prog-id=17 op=LOAD Apr 12 18:53:17.651000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:53:17.651000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:53:17.652000 audit: BPF prog-id=18 op=LOAD Apr 12 18:53:17.652000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:53:17.652000 audit: BPF prog-id=19 op=LOAD Apr 12 18:53:17.652000 audit: BPF prog-id=20 op=LOAD Apr 12 18:53:17.652000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:53:17.652000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:53:17.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.657000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:53:17.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.893000 audit: BPF prog-id=21 op=LOAD Apr 12 18:53:17.893000 audit: BPF prog-id=22 op=LOAD Apr 12 18:53:17.893000 audit: BPF prog-id=23 op=LOAD Apr 12 18:53:17.893000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:53:17.893000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:53:17.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.025454 systemd[1]: Started systemd-journald.service. Apr 12 18:53:17.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.987000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:53:17.987000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc6444b340 a2=4000 a3=7ffc6444b3dc items=0 ppid=1 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:17.987000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:53:17.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.650125 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:53:15.122328 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:17.654986 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:53:15.123076 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:53:18.006205 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:53:15.123095 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:53:18.007977 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:53:15.123125 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:53:18.009916 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:53:15.123135 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:53:18.011714 systemd[1]: Reached target network-pre.target. Apr 12 18:53:15.123165 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:53:18.014773 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:53:15.123177 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:53:18.017605 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:53:15.123358 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:53:18.021369 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:53:15.123394 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:53:18.024091 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:53:15.123406 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:53:18.027879 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:53:15.125014 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:53:18.029475 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:53:15.125065 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:53:18.030969 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:53:15.125112 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:53:18.032524 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:53:15.126015 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:53:18.036637 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:53:15.126046 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:53:18.039441 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:53:15.126069 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:53:18.041212 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:53:18.050791 systemd-journald[1414]: Time spent on flushing to /var/log/journal/ec2ad01d369a46bbf39ecdb51fb05650 is 69.068ms for 1215 entries. Apr 12 18:53:18.050791 systemd-journald[1414]: System Journal (/var/log/journal/ec2ad01d369a46bbf39ecdb51fb05650) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:53:18.135844 systemd-journald[1414]: Received client request to flush runtime journal. Apr 12 18:53:18.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.232425 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:53:18.065825 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:53:17.233062 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:53:18.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.067768 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:53:17.233201 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:53:18.086774 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:53:17.233435 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:53:18.107792 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:53:17.233485 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:53:18.111042 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:53:17.233543 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-04-12T18:53:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:53:18.139984 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:53:18.149487 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:53:18.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.152864 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:53:18.168199 udevadm[1448]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:53:18.182593 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:53:18.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.186140 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:53:18.244758 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:53:18.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.750783 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:53:18.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.751000 audit: BPF prog-id=24 op=LOAD Apr 12 18:53:18.751000 audit: BPF prog-id=25 op=LOAD Apr 12 18:53:18.751000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:53:18.751000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:53:18.753939 systemd[1]: Starting systemd-udevd.service... Apr 12 18:53:18.773553 systemd-udevd[1451]: Using default interface naming scheme 'v252'. Apr 12 18:53:18.808176 systemd[1]: Started systemd-udevd.service. Apr 12 18:53:18.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.809000 audit: BPF prog-id=26 op=LOAD Apr 12 18:53:18.812394 systemd[1]: Starting systemd-networkd.service... Apr 12 18:53:18.819000 audit: BPF prog-id=27 op=LOAD Apr 12 18:53:18.819000 audit: BPF prog-id=28 op=LOAD Apr 12 18:53:18.819000 audit: BPF prog-id=29 op=LOAD Apr 12 18:53:18.822213 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:53:18.876720 (udev-worker)[1463]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:53:18.891798 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:53:18.895439 systemd[1]: Started systemd-userdbd.service. Apr 12 18:53:18.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.993612 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:53:19.002761 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:53:19.002859 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Apr 12 18:53:19.006804 systemd-networkd[1460]: lo: Link UP Apr 12 18:53:19.006819 systemd-networkd[1460]: lo: Gained carrier Apr 12 18:53:19.008088 systemd-networkd[1460]: Enumeration completed Apr 12 18:53:19.008209 systemd[1]: Started systemd-networkd.service. Apr 12 18:53:19.008422 systemd-networkd[1460]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:53:19.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.011536 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:53:19.017396 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:53:19.016983 systemd-networkd[1460]: eth0: Link UP Apr 12 18:53:19.017155 systemd-networkd[1460]: eth0: Gained carrier Apr 12 18:53:19.027775 systemd-networkd[1460]: eth0: DHCPv4 address 172.31.22.226/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:53:19.036648 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1466) Apr 12 18:53:19.043626 kernel: ACPI: button: Sleep Button [SLPF] Apr 12 18:53:19.076000 audit[1456]: AVC avc: denied { confidentiality } for pid=1456 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:53:19.076000 audit[1456]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56374a8af140 a1=32194 a2=7f23333f8bc5 a3=5 items=108 ppid=1451 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:19.076000 audit: CWD cwd="/" Apr 12 18:53:19.076000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=1 name=(null) inode=13978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=2 name=(null) inode=13978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=3 name=(null) inode=13979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=4 name=(null) inode=13978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=5 name=(null) inode=13980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=6 name=(null) inode=13978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=7 name=(null) inode=13981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=8 name=(null) inode=13981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=9 name=(null) inode=13982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=10 name=(null) inode=13981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=11 name=(null) inode=13983 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=12 name=(null) inode=13981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=13 name=(null) inode=13984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=14 name=(null) inode=13981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=15 name=(null) inode=13985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=16 name=(null) inode=13981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=17 name=(null) inode=13986 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=18 name=(null) inode=13978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=19 name=(null) inode=13987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=20 name=(null) inode=13987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=21 name=(null) inode=13988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=22 name=(null) inode=13987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=23 name=(null) inode=13989 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=24 name=(null) inode=13987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=25 name=(null) inode=13990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=26 name=(null) inode=13987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=27 name=(null) inode=13991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=28 name=(null) inode=13987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=29 name=(null) inode=13992 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=30 name=(null) inode=13978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=31 name=(null) inode=13993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=32 name=(null) inode=13993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=33 name=(null) inode=13994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=34 name=(null) inode=13993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=35 name=(null) inode=13995 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=36 name=(null) inode=13993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=37 name=(null) inode=13996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=38 name=(null) inode=13993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=39 name=(null) inode=13997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=40 name=(null) inode=13993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=41 name=(null) inode=13998 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=42 name=(null) inode=13978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=43 name=(null) inode=13999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=44 name=(null) inode=13999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=45 name=(null) inode=14000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=46 name=(null) inode=13999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=47 name=(null) inode=14001 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=48 name=(null) inode=13999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=49 name=(null) inode=14002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=50 name=(null) inode=13999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=51 name=(null) inode=14003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=52 name=(null) inode=13999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=53 name=(null) inode=14004 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=55 name=(null) inode=14018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=56 name=(null) inode=14018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=57 name=(null) inode=14019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=58 name=(null) inode=14018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=59 name=(null) inode=14020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=60 name=(null) inode=14018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=61 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=62 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=63 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=64 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=65 name=(null) inode=14023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=66 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=67 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=68 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=69 name=(null) inode=14025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=70 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=71 name=(null) inode=14026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=72 name=(null) inode=14018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=73 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=74 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=75 name=(null) inode=14028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=76 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=77 name=(null) inode=14029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=78 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=79 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=80 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=81 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=82 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=83 name=(null) inode=14032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=84 name=(null) inode=14018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=85 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=86 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=87 name=(null) inode=14034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=88 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=89 name=(null) inode=14035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=90 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=91 name=(null) inode=14036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=92 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=93 name=(null) inode=14037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=94 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=95 name=(null) inode=14038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=96 name=(null) inode=14018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=97 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=98 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=99 name=(null) inode=14040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=100 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=101 name=(null) inode=14041 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=102 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=103 name=(null) inode=14042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=104 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=105 name=(null) inode=14043 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=106 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PATH item=107 name=(null) inode=14044 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:19.076000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:53:19.137649 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Apr 12 18:53:19.149608 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Apr 12 18:53:19.167609 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:53:19.211156 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:53:19.347025 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:53:19.350976 kernel: kauditd_printk_skb: 232 callbacks suppressed Apr 12 18:53:19.351086 kernel: audit: type=1130 audit(1712947999.347:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.350129 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:53:19.374316 lvm[1565]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:53:19.395775 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:53:19.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.397242 systemd[1]: Reached target cryptsetup.target. Apr 12 18:53:19.402606 kernel: audit: type=1130 audit(1712947999.395:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.404963 systemd[1]: Starting lvm2-activation.service... Apr 12 18:53:19.411540 lvm[1566]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:53:19.441762 systemd[1]: Finished lvm2-activation.service. Apr 12 18:53:19.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.443952 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:53:19.456666 kernel: audit: type=1130 audit(1712947999.442:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.457669 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:53:19.457706 systemd[1]: Reached target local-fs.target. Apr 12 18:53:19.459745 systemd[1]: Reached target machines.target. Apr 12 18:53:19.462492 systemd[1]: Starting ldconfig.service... Apr 12 18:53:19.466026 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:53:19.466092 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:53:19.467268 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:53:19.470472 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:53:19.473536 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:53:19.475216 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:53:19.475282 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:53:19.476700 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:53:19.492209 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1568 (bootctl) Apr 12 18:53:19.494094 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:53:19.513640 systemd-tmpfiles[1571]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:53:19.517633 systemd-tmpfiles[1571]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:53:19.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.518376 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:53:19.527619 kernel: audit: type=1130 audit(1712947999.516:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.529012 systemd-tmpfiles[1571]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:53:19.670457 systemd-fsck[1577]: fsck.fat 4.2 (2021-01-31) Apr 12 18:53:19.670457 systemd-fsck[1577]: /dev/nvme0n1p1: 789 files, 119240/258078 clusters Apr 12 18:53:19.676366 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:53:19.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.680573 systemd[1]: Mounting boot.mount... Apr 12 18:53:19.688319 kernel: audit: type=1130 audit(1712947999.677:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.705222 systemd[1]: Mounted boot.mount. Apr 12 18:53:19.746057 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:53:19.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.762668 kernel: audit: type=1130 audit(1712947999.750:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.835080 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:53:19.846869 kernel: audit: type=1130 audit(1712947999.835:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.846241 systemd[1]: Starting audit-rules.service... Apr 12 18:53:19.849559 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:53:19.854000 audit: BPF prog-id=30 op=LOAD Apr 12 18:53:19.872098 kernel: audit: type=1334 audit(1712947999.854:167): prog-id=30 op=LOAD Apr 12 18:53:19.872176 kernel: audit: type=1334 audit(1712947999.859:168): prog-id=31 op=LOAD Apr 12 18:53:19.859000 audit: BPF prog-id=31 op=LOAD Apr 12 18:53:19.852976 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:53:19.857485 systemd[1]: Starting systemd-resolved.service... Apr 12 18:53:19.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.863086 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:53:19.868048 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:53:19.907321 kernel: audit: type=1130 audit(1712947999.877:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.876912 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:53:19.879169 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:53:19.910000 audit[1596]: SYSTEM_BOOT pid=1596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.915044 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:53:19.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.962684 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:53:19.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:20.012376 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:53:20.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:20.015077 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:53:20.031702 augenrules[1613]: No rules Apr 12 18:53:20.030000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:53:20.030000 audit[1613]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff41389610 a2=420 a3=0 items=0 ppid=1591 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.030000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:53:20.032943 systemd[1]: Finished audit-rules.service. Apr 12 18:53:20.045888 systemd-resolved[1594]: Positive Trust Anchors: Apr 12 18:53:20.045905 systemd-resolved[1594]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:53:20.045947 systemd-resolved[1594]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:53:20.046549 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:53:20.048097 systemd[1]: Reached target time-set.target. Apr 12 18:53:20.075522 systemd-resolved[1594]: Defaulting to hostname 'linux'. Apr 12 18:53:20.077842 systemd[1]: Started systemd-resolved.service. Apr 12 18:53:20.079274 systemd[1]: Reached target network.target. Apr 12 18:53:20.080538 systemd[1]: Reached target nss-lookup.target. Apr 12 18:53:20.137923 ldconfig[1567]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:53:20.142876 systemd[1]: Finished ldconfig.service. Apr 12 18:53:20.145362 systemd[1]: Starting systemd-update-done.service... Apr 12 18:53:20.153094 systemd[1]: Finished systemd-update-done.service. Apr 12 18:53:20.154760 systemd[1]: Reached target sysinit.target. Apr 12 18:53:20.156225 systemd[1]: Started motdgen.path. Apr 12 18:53:20.158485 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:53:20.160556 systemd[1]: Started logrotate.timer. Apr 12 18:53:20.161781 systemd[1]: Started mdadm.timer. Apr 12 18:53:20.162864 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:53:20.164382 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:53:20.164418 systemd[1]: Reached target paths.target. Apr 12 18:53:20.165533 systemd[1]: Reached target timers.target. Apr 12 18:53:20.167228 systemd[1]: Listening on dbus.socket. Apr 12 18:53:20.169222 systemd[1]: Starting docker.socket... Apr 12 18:53:20.173077 systemd[1]: Listening on sshd.socket. Apr 12 18:53:20.174317 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:53:20.174750 systemd[1]: Listening on docker.socket. Apr 12 18:53:20.176022 systemd[1]: Reached target sockets.target. Apr 12 18:53:20.177107 systemd[1]: Reached target basic.target. Apr 12 18:53:20.178591 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:53:20.178617 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:53:20.179675 systemd[1]: Starting containerd.service... Apr 12 18:53:20.181624 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:53:20.183850 systemd[1]: Starting dbus.service... Apr 12 18:53:20.185770 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:53:20.188078 systemd[1]: Starting extend-filesystems.service... Apr 12 18:53:20.189224 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:53:20.190222 systemd[1]: Starting motdgen.service... Apr 12 18:53:20.192418 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:53:20.194481 systemd[1]: Starting prepare-critools.service... Apr 12 18:53:20.196519 systemd[1]: Starting prepare-helm.service... Apr 12 18:53:20.198434 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:53:20.200509 systemd[1]: Starting sshd-keygen.service... Apr 12 18:53:20.883434 jq[1625]: false Apr 12 18:53:20.203635 systemd[1]: Starting systemd-logind.service... Apr 12 18:53:20.204690 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:53:20.204744 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:53:20.205098 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:53:20.898866 jq[1635]: true Apr 12 18:53:20.205809 systemd[1]: Starting update-engine.service... Apr 12 18:53:20.900094 tar[1637]: ./ Apr 12 18:53:20.900094 tar[1637]: ./loopback Apr 12 18:53:20.208143 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:53:20.880381 systemd-resolved[1594]: Clock change detected. Flushing caches. Apr 12 18:53:20.903187 tar[1639]: linux-amd64/helm Apr 12 18:53:20.880523 systemd-timesyncd[1595]: Contacted time server 50.205.57.38:123 (0.flatcar.pool.ntp.org). Apr 12 18:53:20.880593 systemd-timesyncd[1595]: Initial clock synchronization to Fri 2024-04-12 18:53:20.880307 UTC. Apr 12 18:53:20.892415 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:53:20.892610 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:53:20.901154 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:53:20.901348 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:53:20.923690 tar[1638]: crictl Apr 12 18:53:20.931624 extend-filesystems[1626]: Found nvme0n1 Apr 12 18:53:20.940086 extend-filesystems[1626]: Found nvme0n1p1 Apr 12 18:53:20.943526 extend-filesystems[1626]: Found nvme0n1p2 Apr 12 18:53:20.950092 extend-filesystems[1626]: Found nvme0n1p3 Apr 12 18:53:20.951475 jq[1654]: true Apr 12 18:53:20.955154 dbus-daemon[1624]: [system] SELinux support is enabled Apr 12 18:53:20.955914 extend-filesystems[1626]: Found usr Apr 12 18:53:20.959529 extend-filesystems[1626]: Found nvme0n1p4 Apr 12 18:53:20.961405 systemd[1]: Started dbus.service. Apr 12 18:53:20.966219 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:53:20.966262 systemd[1]: Reached target system-config.target. Apr 12 18:53:20.967843 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:53:20.967872 systemd[1]: Reached target user-config.target. Apr 12 18:53:20.973927 extend-filesystems[1626]: Found nvme0n1p6 Apr 12 18:53:20.975290 extend-filesystems[1626]: Found nvme0n1p7 Apr 12 18:53:20.975290 extend-filesystems[1626]: Found nvme0n1p9 Apr 12 18:53:20.979084 extend-filesystems[1626]: Checking size of /dev/nvme0n1p9 Apr 12 18:53:20.981607 dbus-daemon[1624]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1460 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 18:53:20.989583 dbus-daemon[1624]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:53:20.990786 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:53:20.991136 systemd[1]: Finished motdgen.service. Apr 12 18:53:20.997654 systemd[1]: Starting systemd-hostnamed.service... Apr 12 18:53:21.035035 extend-filesystems[1626]: Resized partition /dev/nvme0n1p9 Apr 12 18:53:21.060393 update_engine[1634]: I0412 18:53:21.059232 1634 main.cc:92] Flatcar Update Engine starting Apr 12 18:53:21.063282 extend-filesystems[1680]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:53:21.066941 systemd[1]: Started update-engine.service. Apr 12 18:53:21.070995 systemd[1]: Started locksmithd.service. Apr 12 18:53:21.074183 update_engine[1634]: I0412 18:53:21.074007 1634 update_check_scheduler.cc:74] Next update check in 3m13s Apr 12 18:53:21.080406 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Apr 12 18:53:21.183864 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Apr 12 18:53:21.181964 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:53:21.207509 env[1648]: time="2024-04-12T18:53:21.181339015Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:53:21.207817 bash[1686]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:53:21.210640 extend-filesystems[1680]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 18:53:21.210640 extend-filesystems[1680]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:53:21.210640 extend-filesystems[1680]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Apr 12 18:53:21.210313 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:53:21.223242 extend-filesystems[1626]: Resized filesystem in /dev/nvme0n1p9 Apr 12 18:53:21.210530 systemd[1]: Finished extend-filesystems.service. Apr 12 18:53:21.215091 systemd-logind[1633]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:53:21.215117 systemd-logind[1633]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 18:53:21.215142 systemd-logind[1633]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:53:21.221112 systemd-logind[1633]: New seat seat0. Apr 12 18:53:21.227838 systemd[1]: Started systemd-logind.service. Apr 12 18:53:21.236603 tar[1637]: ./bandwidth Apr 12 18:53:21.320547 env[1648]: time="2024-04-12T18:53:21.320495599Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:53:21.320840 env[1648]: time="2024-04-12T18:53:21.320817175Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:21.322699 env[1648]: time="2024-04-12T18:53:21.322654931Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:53:21.322814 env[1648]: time="2024-04-12T18:53:21.322798793Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:21.323269 env[1648]: time="2024-04-12T18:53:21.323238430Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:53:21.323403 env[1648]: time="2024-04-12T18:53:21.323386618Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:21.323492 env[1648]: time="2024-04-12T18:53:21.323474760Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:53:21.323560 env[1648]: time="2024-04-12T18:53:21.323546769Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:21.323714 env[1648]: time="2024-04-12T18:53:21.323698837Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:21.324070 env[1648]: time="2024-04-12T18:53:21.324048140Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:21.324345 env[1648]: time="2024-04-12T18:53:21.324319167Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:53:21.324449 env[1648]: time="2024-04-12T18:53:21.324431527Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:53:21.324573 env[1648]: time="2024-04-12T18:53:21.324555593Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:53:21.324646 env[1648]: time="2024-04-12T18:53:21.324634834Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337323506Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337388614Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337410319Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337462327Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337480538Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337554680Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337574391Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337593866Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337614391Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337632247Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337649888Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337669352Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337843243Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:53:21.338030 env[1648]: time="2024-04-12T18:53:21.337948113Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:53:21.339157 env[1648]: time="2024-04-12T18:53:21.339128705Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:53:21.339286 env[1648]: time="2024-04-12T18:53:21.339266340Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.339388 env[1648]: time="2024-04-12T18:53:21.339353558Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:53:21.339535 env[1648]: time="2024-04-12T18:53:21.339518219Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.339995 env[1648]: time="2024-04-12T18:53:21.339972274Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340092 env[1648]: time="2024-04-12T18:53:21.340075541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340166 env[1648]: time="2024-04-12T18:53:21.340151112Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340242 env[1648]: time="2024-04-12T18:53:21.340228589Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340309 env[1648]: time="2024-04-12T18:53:21.340294915Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340407 env[1648]: time="2024-04-12T18:53:21.340391757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340484 env[1648]: time="2024-04-12T18:53:21.340469670Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340581 env[1648]: time="2024-04-12T18:53:21.340566847Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:53:21.340786 env[1648]: time="2024-04-12T18:53:21.340771374Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340860 env[1648]: time="2024-04-12T18:53:21.340846597Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.340932 env[1648]: time="2024-04-12T18:53:21.340919785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.341000 env[1648]: time="2024-04-12T18:53:21.340987058Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:53:21.341075 env[1648]: time="2024-04-12T18:53:21.341058308Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:53:21.341137 env[1648]: time="2024-04-12T18:53:21.341124895Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:53:21.341210 env[1648]: time="2024-04-12T18:53:21.341196145Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:53:21.341303 env[1648]: time="2024-04-12T18:53:21.341289611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:53:21.341713 env[1648]: time="2024-04-12T18:53:21.341645112Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:53:21.344886 env[1648]: time="2024-04-12T18:53:21.341861124Z" level=info msg="Connect containerd service" Apr 12 18:53:21.344886 env[1648]: time="2024-04-12T18:53:21.341911488Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:53:21.346661 dbus-daemon[1624]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 18:53:21.346830 systemd[1]: Started systemd-hostnamed.service. Apr 12 18:53:21.350713 dbus-daemon[1624]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1667 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 18:53:21.351214 env[1648]: time="2024-04-12T18:53:21.351175876Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:53:21.355495 systemd[1]: Starting polkit.service... Apr 12 18:53:21.360208 env[1648]: time="2024-04-12T18:53:21.360176360Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:53:21.360358 env[1648]: time="2024-04-12T18:53:21.360344016Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:53:21.364520 env[1648]: time="2024-04-12T18:53:21.364460248Z" level=info msg="Start subscribing containerd event" Apr 12 18:53:21.367335 env[1648]: time="2024-04-12T18:53:21.367291461Z" level=info msg="Start recovering state" Apr 12 18:53:21.367558 env[1648]: time="2024-04-12T18:53:21.367540952Z" level=info msg="Start event monitor" Apr 12 18:53:21.367642 env[1648]: time="2024-04-12T18:53:21.367628976Z" level=info msg="Start snapshots syncer" Apr 12 18:53:21.367726 env[1648]: time="2024-04-12T18:53:21.367715137Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:53:21.367837 env[1648]: time="2024-04-12T18:53:21.367822259Z" level=info msg="Start streaming server" Apr 12 18:53:21.368331 systemd[1]: Started containerd.service. Apr 12 18:53:21.369140 env[1648]: time="2024-04-12T18:53:21.369106944Z" level=info msg="containerd successfully booted in 0.240715s" Apr 12 18:53:21.392396 polkitd[1724]: Started polkitd version 121 Apr 12 18:53:21.419005 polkitd[1724]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 18:53:21.421437 polkitd[1724]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 18:53:21.424297 polkitd[1724]: Finished loading, compiling and executing 2 rules Apr 12 18:53:21.424939 dbus-daemon[1624]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 18:53:21.425130 systemd[1]: Started polkit.service. Apr 12 18:53:21.425887 polkitd[1724]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 18:53:21.453791 systemd-hostnamed[1667]: Hostname set to (transient) Apr 12 18:53:21.456919 systemd-resolved[1594]: System hostname changed to 'ip-172-31-22-226'. Apr 12 18:53:21.479501 tar[1637]: ./ptp Apr 12 18:53:21.672266 coreos-metadata[1623]: Apr 12 18:53:21.666 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Apr 12 18:53:21.683751 coreos-metadata[1623]: Apr 12 18:53:21.681 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Apr 12 18:53:21.684514 coreos-metadata[1623]: Apr 12 18:53:21.683 INFO Fetch successful Apr 12 18:53:21.684658 coreos-metadata[1623]: Apr 12 18:53:21.684 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Apr 12 18:53:21.684767 coreos-metadata[1623]: Apr 12 18:53:21.684 INFO Fetch successful Apr 12 18:53:21.686652 unknown[1623]: wrote ssh authorized keys file for user: core Apr 12 18:53:21.698579 systemd-networkd[1460]: eth0: Gained IPv6LL Apr 12 18:53:21.705174 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:53:21.707696 systemd[1]: Reached target network-online.target. Apr 12 18:53:21.711112 systemd[1]: Started amazon-ssm-agent.service. Apr 12 18:53:21.714494 systemd[1]: Started nvidia.service. Apr 12 18:53:21.732110 tar[1637]: ./vlan Apr 12 18:53:21.749865 update-ssh-keys[1790]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:53:21.750673 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:53:21.963726 amazon-ssm-agent[1791]: 2024/04/12 18:53:21 Failed to load instance info from vault. RegistrationKey does not exist. Apr 12 18:53:21.967858 amazon-ssm-agent[1791]: Initializing new seelog logger Apr 12 18:53:21.980657 amazon-ssm-agent[1791]: New Seelog Logger Creation Complete Apr 12 18:53:21.980856 amazon-ssm-agent[1791]: 2024/04/12 18:53:21 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:53:21.980856 amazon-ssm-agent[1791]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:53:21.981047 amazon-ssm-agent[1791]: 2024/04/12 18:53:21 processing appconfig overrides Apr 12 18:53:22.049973 tar[1637]: ./host-device Apr 12 18:53:22.116669 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:53:22.153748 tar[1637]: ./tuning Apr 12 18:53:22.239167 tar[1637]: ./vrf Apr 12 18:53:22.330040 tar[1637]: ./sbr Apr 12 18:53:22.415027 tar[1637]: ./tap Apr 12 18:53:22.499152 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Create new startup processor Apr 12 18:53:22.500472 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [LongRunningPluginsManager] registered plugins: {} Apr 12 18:53:22.502750 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Initializing bookkeeping folders Apr 12 18:53:22.502929 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO removing the completed state files Apr 12 18:53:22.502992 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Initializing bookkeeping folders for long running plugins Apr 12 18:53:22.503090 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Apr 12 18:53:22.503152 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Initializing healthcheck folders for long running plugins Apr 12 18:53:22.503207 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Initializing locations for inventory plugin Apr 12 18:53:22.503315 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Initializing default location for custom inventory Apr 12 18:53:22.503398 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Initializing default location for file inventory Apr 12 18:53:22.503467 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Initializing default location for role inventory Apr 12 18:53:22.503526 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Init the cloudwatchlogs publisher Apr 12 18:53:22.503593 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:runPowerShellScript Apr 12 18:53:22.503656 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:updateSsmAgent Apr 12 18:53:22.503712 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:configureDocker Apr 12 18:53:22.503762 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:runDockerAction Apr 12 18:53:22.503852 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:configurePackage Apr 12 18:53:22.503917 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:softwareInventory Apr 12 18:53:22.503976 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:refreshAssociation Apr 12 18:53:22.504041 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:downloadContent Apr 12 18:53:22.504099 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform independent plugin aws:runDocument Apr 12 18:53:22.504154 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Successfully loaded platform dependent plugin aws:runShellScript Apr 12 18:53:22.504228 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Apr 12 18:53:22.504292 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO OS: linux, Arch: amd64 Apr 12 18:53:22.505568 amazon-ssm-agent[1791]: datastore file /var/lib/amazon/ssm/i-0b2eb9d11c61063e2/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Apr 12 18:53:22.553055 tar[1637]: ./dhcp Apr 12 18:53:22.600404 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] Starting session document processing engine... Apr 12 18:53:22.664891 systemd[1]: Finished prepare-critools.service. Apr 12 18:53:22.694497 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] [EngineProcessor] Starting Apr 12 18:53:22.788855 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Apr 12 18:53:22.814566 tar[1637]: ./static Apr 12 18:53:22.853081 tar[1637]: ./firewall Apr 12 18:53:22.876715 tar[1639]: linux-amd64/LICENSE Apr 12 18:53:22.877096 tar[1639]: linux-amd64/README.md Apr 12 18:53:22.883563 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0b2eb9d11c61063e2, requestId: 0c5af8d4-67eb-4009-b664-a4c1a231b887 Apr 12 18:53:22.888804 systemd[1]: Finished prepare-helm.service. Apr 12 18:53:22.912119 tar[1637]: ./macvlan Apr 12 18:53:22.955652 tar[1637]: ./dummy Apr 12 18:53:22.978306 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [OfflineService] Starting document processing engine... Apr 12 18:53:23.002174 tar[1637]: ./bridge Apr 12 18:53:23.054855 tar[1637]: ./ipvlan Apr 12 18:53:23.073203 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [OfflineService] [EngineProcessor] Starting Apr 12 18:53:23.103264 tar[1637]: ./portmap Apr 12 18:53:23.150926 tar[1637]: ./host-local Apr 12 18:53:23.168329 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [OfflineService] [EngineProcessor] Initial processing Apr 12 18:53:23.213695 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:53:23.263673 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [OfflineService] Starting message polling Apr 12 18:53:23.296534 locksmithd[1685]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:53:23.359243 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [OfflineService] Starting send replies to MDS Apr 12 18:53:23.454872 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [LongRunningPluginsManager] starting long running plugin manager Apr 12 18:53:23.550756 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Apr 12 18:53:23.612340 sshd_keygen[1656]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:53:23.646787 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Apr 12 18:53:23.649936 systemd[1]: Finished sshd-keygen.service. Apr 12 18:53:23.653388 systemd[1]: Starting issuegen.service... Apr 12 18:53:23.660109 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:53:23.660339 systemd[1]: Finished issuegen.service. Apr 12 18:53:23.663576 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:53:23.671547 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:53:23.674829 systemd[1]: Started getty@tty1.service. Apr 12 18:53:23.677930 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:53:23.679484 systemd[1]: Reached target getty.target. Apr 12 18:53:23.681127 systemd[1]: Reached target multi-user.target. Apr 12 18:53:23.683917 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:53:23.692745 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:53:23.692909 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:53:23.694671 systemd[1]: Startup finished in 644ms (kernel) + 29.052s (initrd) + 8.270s (userspace) = 37.967s. Apr 12 18:53:23.743067 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [HealthCheck] HealthCheck reporting agent health. Apr 12 18:53:23.839674 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] Starting document processing engine... Apr 12 18:53:23.936308 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] [EngineProcessor] Starting Apr 12 18:53:24.033194 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Apr 12 18:53:24.130303 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] Starting message polling Apr 12 18:53:24.227723 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] Starting send replies to MDS Apr 12 18:53:24.325240 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [instanceID=i-0b2eb9d11c61063e2] Starting association polling Apr 12 18:53:24.422931 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Apr 12 18:53:24.520843 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] [Association] Launching response handler Apr 12 18:53:24.618762 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Apr 12 18:53:24.716855 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Apr 12 18:53:24.774977 systemd[1]: Created slice system-sshd.slice. Apr 12 18:53:24.776133 systemd[1]: Started sshd@0-172.31.22.226:22-147.75.109.163:35918.service. Apr 12 18:53:24.815210 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Apr 12 18:53:24.913597 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] listening reply. Apr 12 18:53:24.950886 sshd[1838]: Accepted publickey for core from 147.75.109.163 port 35918 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:24.953736 sshd[1838]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:24.972590 systemd[1]: Created slice user-500.slice. Apr 12 18:53:24.973833 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:53:24.981433 systemd-logind[1633]: New session 1 of user core. Apr 12 18:53:24.985852 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:53:24.987405 systemd[1]: Starting user@500.service... Apr 12 18:53:24.991335 (systemd)[1841]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:25.012226 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [StartupProcessor] Executing startup processor tasks Apr 12 18:53:25.095661 systemd[1841]: Queued start job for default target default.target. Apr 12 18:53:25.096322 systemd[1841]: Reached target paths.target. Apr 12 18:53:25.096356 systemd[1841]: Reached target sockets.target. Apr 12 18:53:25.096405 systemd[1841]: Reached target timers.target. Apr 12 18:53:25.096424 systemd[1841]: Reached target basic.target. Apr 12 18:53:25.096543 systemd[1]: Started user@500.service. Apr 12 18:53:25.097725 systemd[1]: Started session-1.scope. Apr 12 18:53:25.098219 systemd[1841]: Reached target default.target. Apr 12 18:53:25.098437 systemd[1841]: Startup finished in 99ms. Apr 12 18:53:25.111017 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Apr 12 18:53:25.209989 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Apr 12 18:53:25.237359 systemd[1]: Started sshd@1-172.31.22.226:22-147.75.109.163:35932.service. Apr 12 18:53:25.310040 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.3 Apr 12 18:53:25.407352 sshd[1850]: Accepted publickey for core from 147.75.109.163 port 35932 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:25.408677 sshd[1850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:25.409520 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0b2eb9d11c61063e2?role=subscribe&stream=input Apr 12 18:53:25.420631 systemd-logind[1633]: New session 2 of user core. Apr 12 18:53:25.421224 systemd[1]: Started session-2.scope. Apr 12 18:53:25.509103 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0b2eb9d11c61063e2?role=subscribe&stream=input Apr 12 18:53:25.547709 sshd[1850]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:25.550731 systemd[1]: sshd@1-172.31.22.226:22-147.75.109.163:35932.service: Deactivated successfully. Apr 12 18:53:25.551631 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:53:25.552339 systemd-logind[1633]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:53:25.554733 systemd-logind[1633]: Removed session 2. Apr 12 18:53:25.581583 systemd[1]: Started sshd@2-172.31.22.226:22-147.75.109.163:35944.service. Apr 12 18:53:25.608909 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] Starting receiving message from control channel Apr 12 18:53:25.709040 amazon-ssm-agent[1791]: 2024-04-12 18:53:22 INFO [MessageGatewayService] [EngineProcessor] Initial processing Apr 12 18:53:25.752255 sshd[1856]: Accepted publickey for core from 147.75.109.163 port 35944 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:25.753754 sshd[1856]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:25.758809 systemd[1]: Started session-3.scope. Apr 12 18:53:25.759659 systemd-logind[1633]: New session 3 of user core. Apr 12 18:53:25.809262 amazon-ssm-agent[1791]: 2024-04-12 18:53:24 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Apr 12 18:53:25.882495 sshd[1856]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:25.885413 systemd[1]: sshd@2-172.31.22.226:22-147.75.109.163:35944.service: Deactivated successfully. Apr 12 18:53:25.886297 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:53:25.886981 systemd-logind[1633]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:53:25.887917 systemd-logind[1633]: Removed session 3. Apr 12 18:53:25.907529 systemd[1]: Started sshd@3-172.31.22.226:22-147.75.109.163:35948.service. Apr 12 18:53:26.076644 sshd[1862]: Accepted publickey for core from 147.75.109.163 port 35948 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:26.078177 sshd[1862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:26.083578 systemd[1]: Started session-4.scope. Apr 12 18:53:26.084736 systemd-logind[1633]: New session 4 of user core. Apr 12 18:53:26.212714 sshd[1862]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:26.219315 systemd[1]: sshd@3-172.31.22.226:22-147.75.109.163:35948.service: Deactivated successfully. Apr 12 18:53:26.220174 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:53:26.220829 systemd-logind[1633]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:53:26.222734 systemd-logind[1633]: Removed session 4. Apr 12 18:53:26.239261 systemd[1]: Started sshd@4-172.31.22.226:22-147.75.109.163:35954.service. Apr 12 18:53:26.407766 sshd[1868]: Accepted publickey for core from 147.75.109.163 port 35954 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:26.408737 sshd[1868]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:26.414456 systemd[1]: Started session-5.scope. Apr 12 18:53:26.414456 systemd-logind[1633]: New session 5 of user core. Apr 12 18:53:26.544892 sudo[1871]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:53:26.545419 sudo[1871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:26.553593 dbus-daemon[1624]: Н\xf7\x9f V: received setenforce notice (enforcing=-1871522656) Apr 12 18:53:26.555624 sudo[1871]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:26.580074 sshd[1868]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:26.583923 systemd[1]: sshd@4-172.31.22.226:22-147.75.109.163:35954.service: Deactivated successfully. Apr 12 18:53:26.584858 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:53:26.585561 systemd-logind[1633]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:53:26.586668 systemd-logind[1633]: Removed session 5. Apr 12 18:53:26.605289 systemd[1]: Started sshd@5-172.31.22.226:22-147.75.109.163:35962.service. Apr 12 18:53:26.767741 sshd[1875]: Accepted publickey for core from 147.75.109.163 port 35962 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:26.772924 sshd[1875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:26.780749 systemd[1]: Started session-6.scope. Apr 12 18:53:26.782128 systemd-logind[1633]: New session 6 of user core. Apr 12 18:53:26.902374 sudo[1879]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:53:26.903437 sudo[1879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:26.912409 sudo[1879]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:26.922120 sudo[1878]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:53:26.922438 sudo[1878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:26.949301 systemd[1]: Stopping audit-rules.service... Apr 12 18:53:26.951000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:53:26.953275 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:53:26.953388 kernel: audit: type=1305 audit(1712948006.951:175): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:53:26.953424 auditctl[1882]: No rules Apr 12 18:53:26.953984 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:53:26.951000 audit[1882]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe150aa990 a2=420 a3=0 items=0 ppid=1 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.954226 systemd[1]: Stopped audit-rules.service. Apr 12 18:53:26.966057 systemd[1]: Starting audit-rules.service... Apr 12 18:53:26.983387 kernel: audit: type=1300 audit(1712948006.951:175): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe150aa990 a2=420 a3=0 items=0 ppid=1 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.983515 kernel: audit: type=1327 audit(1712948006.951:175): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:53:26.951000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:53:26.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:26.991411 kernel: audit: type=1131 audit(1712948006.953:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.004733 augenrules[1899]: No rules Apr 12 18:53:27.005323 systemd[1]: Finished audit-rules.service. Apr 12 18:53:27.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.006868 sudo[1878]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:27.011392 kernel: audit: type=1130 audit(1712948007.005:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.011452 kernel: audit: type=1106 audit(1712948007.006:178): pid=1878 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.006000 audit[1878]: USER_END pid=1878 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.006000 audit[1878]: CRED_DISP pid=1878 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.023624 kernel: audit: type=1104 audit(1712948007.006:179): pid=1878 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.029147 sshd[1875]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:27.031000 audit[1875]: USER_END pid=1875 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:27.034934 systemd-logind[1633]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:53:27.036172 systemd[1]: sshd@5-172.31.22.226:22-147.75.109.163:35962.service: Deactivated successfully. Apr 12 18:53:27.037136 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:53:27.038953 systemd-logind[1633]: Removed session 6. Apr 12 18:53:27.031000 audit[1875]: CRED_DISP pid=1875 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:27.046818 kernel: audit: type=1106 audit(1712948007.031:180): pid=1875 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:27.046915 kernel: audit: type=1104 audit(1712948007.031:181): pid=1875 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:27.046959 kernel: audit: type=1131 audit(1712948007.031:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.226:22-147.75.109.163:35962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.226:22-147.75.109.163:35962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.056308 systemd[1]: Started sshd@6-172.31.22.226:22-147.75.109.163:53788.service. Apr 12 18:53:27.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.226:22-147.75.109.163:53788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.227000 audit[1905]: USER_ACCT pid=1905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:27.228464 sshd[1905]: Accepted publickey for core from 147.75.109.163 port 53788 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:27.231000 audit[1905]: CRED_ACQ pid=1905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:27.231000 audit[1905]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd37f2f660 a2=3 a3=0 items=0 ppid=1 pid=1905 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.231000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:53:27.232642 sshd[1905]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:27.248244 systemd-logind[1633]: New session 7 of user core. Apr 12 18:53:27.248806 systemd[1]: Started session-7.scope. Apr 12 18:53:27.254000 audit[1905]: USER_START pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:27.256000 audit[1907]: CRED_ACQ pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:27.346000 audit[1908]: USER_ACCT pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.347000 audit[1908]: CRED_REFR pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.347323 sudo[1908]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:53:27.347636 sudo[1908]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:27.350000 audit[1908]: USER_START pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:27.945796 systemd[1]: Starting docker.service... Apr 12 18:53:27.991739 env[1923]: time="2024-04-12T18:53:27.991608803Z" level=info msg="Starting up" Apr 12 18:53:27.994301 env[1923]: time="2024-04-12T18:53:27.994271871Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:53:27.995170 env[1923]: time="2024-04-12T18:53:27.994418906Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:53:27.995170 env[1923]: time="2024-04-12T18:53:27.994453741Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:53:27.995170 env[1923]: time="2024-04-12T18:53:27.994469856Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:53:27.996420 env[1923]: time="2024-04-12T18:53:27.996401987Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:53:27.996496 env[1923]: time="2024-04-12T18:53:27.996485729Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:53:27.996556 env[1923]: time="2024-04-12T18:53:27.996545264Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:53:27.996598 env[1923]: time="2024-04-12T18:53:27.996590889Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:53:28.002497 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4054755508-merged.mount: Deactivated successfully. Apr 12 18:53:28.201759 env[1923]: time="2024-04-12T18:53:28.201644243Z" level=info msg="Loading containers: start." Apr 12 18:53:28.278000 audit[1956]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.278000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcc7a7c470 a2=0 a3=7ffcc7a7c45c items=0 ppid=1923 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.278000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:53:28.281000 audit[1958]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.281000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff255e8d40 a2=0 a3=7fff255e8d2c items=0 ppid=1923 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.281000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:53:28.283000 audit[1960]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.283000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe6f415370 a2=0 a3=7ffe6f41535c items=0 ppid=1923 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.283000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:53:28.285000 audit[1962]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1962 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.285000 audit[1962]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffee3ff3660 a2=0 a3=7ffee3ff364c items=0 ppid=1923 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.285000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:53:28.288000 audit[1964]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.288000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2726dad0 a2=0 a3=7fff2726dabc items=0 ppid=1923 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.288000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:53:28.306000 audit[1969]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.306000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3e78d460 a2=0 a3=7ffc3e78d44c items=0 ppid=1923 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:53:28.319000 audit[1971]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.319000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd485b3a40 a2=0 a3=7ffd485b3a2c items=0 ppid=1923 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:53:28.322000 audit[1973]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.322000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcf5445820 a2=0 a3=7ffcf544580c items=0 ppid=1923 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:53:28.324000 audit[1975]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.324000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffee05ff6b0 a2=0 a3=7ffee05ff69c items=0 ppid=1923 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:28.335000 audit[1979]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.335000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd9a942680 a2=0 a3=7ffd9a94266c items=0 ppid=1923 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.335000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:28.336000 audit[1980]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.336000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff900ec9d0 a2=0 a3=7fff900ec9bc items=0 ppid=1923 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:28.350399 kernel: Initializing XFRM netlink socket Apr 12 18:53:28.392125 env[1923]: time="2024-04-12T18:53:28.392082216Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:53:28.393094 (udev-worker)[1935]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:53:28.463000 audit[1988]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.463000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffda70d3960 a2=0 a3=7ffda70d394c items=0 ppid=1923 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:53:28.517000 audit[1991]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.517000 audit[1991]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc4c6d2a50 a2=0 a3=7ffc4c6d2a3c items=0 ppid=1923 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.517000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:53:28.538000 audit[1994]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.538000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffea4e20e70 a2=0 a3=7ffea4e20e5c items=0 ppid=1923 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.538000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:53:28.548000 audit[1996]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.548000 audit[1996]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffa437fa30 a2=0 a3=7fffa437fa1c items=0 ppid=1923 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.548000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:53:28.552000 audit[1998]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.552000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe7b507640 a2=0 a3=7ffe7b50762c items=0 ppid=1923 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.552000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:53:28.554000 audit[2000]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.554000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffecd5c0a0 a2=0 a3=7fffecd5c08c items=0 ppid=1923 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.554000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:53:28.556000 audit[2002]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2002 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.556000 audit[2002]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdec16ca50 a2=0 a3=7ffdec16ca3c items=0 ppid=1923 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.556000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:53:28.565000 audit[2005]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.565000 audit[2005]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff60542c60 a2=0 a3=7fff60542c4c items=0 ppid=1923 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.565000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:53:28.568000 audit[2007]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.568000 audit[2007]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe1e1aa510 a2=0 a3=7ffe1e1aa4fc items=0 ppid=1923 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.568000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:53:28.570000 audit[2009]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.570000 audit[2009]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe4821ca90 a2=0 a3=7ffe4821ca7c items=0 ppid=1923 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:53:28.572000 audit[2011]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.572000 audit[2011]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeef8e7300 a2=0 a3=7ffeef8e72ec items=0 ppid=1923 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.572000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:53:28.573272 systemd-networkd[1460]: docker0: Link UP Apr 12 18:53:28.583000 audit[2015]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2015 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.583000 audit[2015]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb5bcd730 a2=0 a3=7fffb5bcd71c items=0 ppid=1923 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:28.584000 audit[2016]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:28.584000 audit[2016]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff45edfe60 a2=0 a3=7fff45edfe4c items=0 ppid=1923 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.584000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:28.585612 env[1923]: time="2024-04-12T18:53:28.585577190Z" level=info msg="Loading containers: done." Apr 12 18:53:28.596959 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck740604959-merged.mount: Deactivated successfully. Apr 12 18:53:28.617411 env[1923]: time="2024-04-12T18:53:28.617354334Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:53:28.617603 env[1923]: time="2024-04-12T18:53:28.617545716Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:53:28.617657 env[1923]: time="2024-04-12T18:53:28.617639244Z" level=info msg="Daemon has completed initialization" Apr 12 18:53:28.668719 systemd[1]: Started docker.service. Apr 12 18:53:28.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:28.678848 env[1923]: time="2024-04-12T18:53:28.678780399Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:53:28.700387 systemd[1]: Reloading. Apr 12 18:53:28.816029 /usr/lib/systemd/system-generators/torcx-generator[2064]: time="2024-04-12T18:53:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:28.829345 /usr/lib/systemd/system-generators/torcx-generator[2064]: time="2024-04-12T18:53:28Z" level=info msg="torcx already run" Apr 12 18:53:28.899371 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:28.899396 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:28.920548 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:29.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit: BPF prog-id=40 op=LOAD Apr 12 18:53:29.018000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit: BPF prog-id=41 op=LOAD Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.018000 audit: BPF prog-id=42 op=LOAD Apr 12 18:53:29.018000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:53:29.018000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit: BPF prog-id=43 op=LOAD Apr 12 18:53:29.021000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit: BPF prog-id=44 op=LOAD Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.022000 audit: BPF prog-id=45 op=LOAD Apr 12 18:53:29.022000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:53:29.022000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.024000 audit: BPF prog-id=46 op=LOAD Apr 12 18:53:29.024000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit: BPF prog-id=47 op=LOAD Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.028000 audit: BPF prog-id=48 op=LOAD Apr 12 18:53:29.028000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:53:29.028000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.029000 audit: BPF prog-id=49 op=LOAD Apr 12 18:53:29.029000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit: BPF prog-id=50 op=LOAD Apr 12 18:53:29.030000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit: BPF prog-id=51 op=LOAD Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.030000 audit: BPF prog-id=52 op=LOAD Apr 12 18:53:29.031000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:53:29.031000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.031000 audit: BPF prog-id=53 op=LOAD Apr 12 18:53:29.031000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit: BPF prog-id=54 op=LOAD Apr 12 18:53:29.033000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit: BPF prog-id=55 op=LOAD Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.033000 audit: BPF prog-id=56 op=LOAD Apr 12 18:53:29.033000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:53:29.033000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.034000 audit: BPF prog-id=57 op=LOAD Apr 12 18:53:29.034000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:53:29.048789 systemd[1]: Started kubelet.service. Apr 12 18:53:29.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:29.142135 kubelet[2115]: E0412 18:53:29.141986 2115 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:53:29.152062 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:53:29.152227 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:53:29.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:29.530805 env[1648]: time="2024-04-12T18:53:29.530758906Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 18:53:30.241642 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount864596710.mount: Deactivated successfully. Apr 12 18:53:32.912434 env[1648]: time="2024-04-12T18:53:32.912360320Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:32.915104 env[1648]: time="2024-04-12T18:53:32.915061787Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:32.917423 env[1648]: time="2024-04-12T18:53:32.917387436Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:32.919681 env[1648]: time="2024-04-12T18:53:32.919645634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:32.920406 env[1648]: time="2024-04-12T18:53:32.920355364Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533\"" Apr 12 18:53:32.932197 env[1648]: time="2024-04-12T18:53:32.932148313Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 18:53:35.322945 env[1648]: time="2024-04-12T18:53:35.322890318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:35.325543 env[1648]: time="2024-04-12T18:53:35.325501750Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:35.327976 env[1648]: time="2024-04-12T18:53:35.327937921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:35.330123 env[1648]: time="2024-04-12T18:53:35.330085855Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:35.330835 env[1648]: time="2024-04-12T18:53:35.330795948Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3\"" Apr 12 18:53:35.342627 env[1648]: time="2024-04-12T18:53:35.342578969Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 18:53:36.844022 env[1648]: time="2024-04-12T18:53:36.843965344Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:36.847262 env[1648]: time="2024-04-12T18:53:36.847217206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:36.849936 env[1648]: time="2024-04-12T18:53:36.849899097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:36.852020 env[1648]: time="2024-04-12T18:53:36.851986498Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:36.852677 env[1648]: time="2024-04-12T18:53:36.852641023Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b\"" Apr 12 18:53:36.864323 env[1648]: time="2024-04-12T18:53:36.864280963Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 18:53:38.286863 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1374712505.mount: Deactivated successfully. Apr 12 18:53:38.978887 env[1648]: time="2024-04-12T18:53:38.978824376Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:38.987852 env[1648]: time="2024-04-12T18:53:38.987806972Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:38.989996 env[1648]: time="2024-04-12T18:53:38.989954891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:38.991804 env[1648]: time="2024-04-12T18:53:38.991773580Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:38.992211 env[1648]: time="2024-04-12T18:53:38.992174530Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392\"" Apr 12 18:53:39.008719 env[1648]: time="2024-04-12T18:53:39.008613914Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 18:53:39.212073 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:53:39.212323 systemd[1]: Stopped kubelet.service. Apr 12 18:53:39.222509 kernel: kauditd_printk_skb: 292 callbacks suppressed Apr 12 18:53:39.222630 kernel: audit: type=1130 audit(1712948019.211:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:39.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:39.214433 systemd[1]: Started kubelet.service. Apr 12 18:53:39.230953 kernel: audit: type=1131 audit(1712948019.212:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:39.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:39.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:39.238407 kernel: audit: type=1130 audit(1712948019.214:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:39.303450 kubelet[2152]: E0412 18:53:39.302911 2152 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:53:39.319252 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:53:39.319543 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:53:39.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:39.327412 kernel: audit: type=1131 audit(1712948019.319:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:39.625505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3438169892.mount: Deactivated successfully. Apr 12 18:53:40.935222 env[1648]: time="2024-04-12T18:53:40.935164279Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:40.937983 env[1648]: time="2024-04-12T18:53:40.937938310Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:40.940354 env[1648]: time="2024-04-12T18:53:40.940316022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:40.942393 env[1648]: time="2024-04-12T18:53:40.942344275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:40.943178 env[1648]: time="2024-04-12T18:53:40.943141262Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Apr 12 18:53:40.955084 env[1648]: time="2024-04-12T18:53:40.955044327Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:53:41.491007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2040127700.mount: Deactivated successfully. Apr 12 18:53:41.502339 env[1648]: time="2024-04-12T18:53:41.502290079Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:41.505496 env[1648]: time="2024-04-12T18:53:41.505450363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:41.508070 env[1648]: time="2024-04-12T18:53:41.508027759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:41.510018 env[1648]: time="2024-04-12T18:53:41.509978941Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:41.510449 env[1648]: time="2024-04-12T18:53:41.510414433Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 18:53:41.524582 env[1648]: time="2024-04-12T18:53:41.524551220Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 18:53:42.134698 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1204191800.mount: Deactivated successfully. Apr 12 18:53:45.501857 env[1648]: time="2024-04-12T18:53:45.501797234Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:45.504535 env[1648]: time="2024-04-12T18:53:45.504499313Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:45.506913 env[1648]: time="2024-04-12T18:53:45.506880762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:45.509074 env[1648]: time="2024-04-12T18:53:45.509046533Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:45.510027 env[1648]: time="2024-04-12T18:53:45.509990512Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Apr 12 18:53:47.891104 systemd[1]: Stopped kubelet.service. Apr 12 18:53:47.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:47.902158 kernel: audit: type=1130 audit(1712948027.890:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:47.902286 kernel: audit: type=1131 audit(1712948027.895:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:47.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:47.919394 systemd[1]: Reloading. Apr 12 18:53:48.034286 /usr/lib/systemd/system-generators/torcx-generator[2254]: time="2024-04-12T18:53:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:48.043483 /usr/lib/systemd/system-generators/torcx-generator[2254]: time="2024-04-12T18:53:48Z" level=info msg="torcx already run" Apr 12 18:53:48.111378 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:48.111404 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:48.131786 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.208390 kernel: audit: type=1400 audit(1712948028.202:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.223027 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:53:48.223161 kernel: audit: type=1400 audit(1712948028.202:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.223206 kernel: audit: type=1400 audit(1712948028.202:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.223240 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:53:48.223273 kernel: audit: backlog limit exceeded Apr 12 18:53:48.223309 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.232960 kernel: audit: type=1400 audit(1712948028.202:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit: BPF prog-id=58 op=LOAD Apr 12 18:53:48.207000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit: BPF prog-id=59 op=LOAD Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.207000 audit: BPF prog-id=60 op=LOAD Apr 12 18:53:48.207000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:53:48.207000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit: BPF prog-id=61 op=LOAD Apr 12 18:53:48.210000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit: BPF prog-id=62 op=LOAD Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.210000 audit: BPF prog-id=63 op=LOAD Apr 12 18:53:48.217000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:53:48.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.233000 audit: BPF prog-id=67 op=LOAD Apr 12 18:53:48.233000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit: BPF prog-id=68 op=LOAD Apr 12 18:53:48.235000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit: BPF prog-id=69 op=LOAD Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit: BPF prog-id=70 op=LOAD Apr 12 18:53:48.235000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:53:48.235000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.236000 audit: BPF prog-id=71 op=LOAD Apr 12 18:53:48.236000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit: BPF prog-id=72 op=LOAD Apr 12 18:53:48.237000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit: BPF prog-id=73 op=LOAD Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.237000 audit: BPF prog-id=74 op=LOAD Apr 12 18:53:48.237000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:53:48.237000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.238000 audit: BPF prog-id=75 op=LOAD Apr 12 18:53:48.238000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:53:48.257655 systemd[1]: Started kubelet.service. Apr 12 18:53:48.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:48.310259 kubelet[2307]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:48.310663 kubelet[2307]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:53:48.310663 kubelet[2307]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:48.310663 kubelet[2307]: I0412 18:53:48.310487 2307 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:53:48.819219 kubelet[2307]: I0412 18:53:48.819182 2307 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:53:48.819219 kubelet[2307]: I0412 18:53:48.819214 2307 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:53:48.819532 kubelet[2307]: I0412 18:53:48.819509 2307 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:53:48.823552 kubelet[2307]: E0412 18:53:48.823532 2307 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.22.226:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.823809 kubelet[2307]: I0412 18:53:48.823794 2307 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:48.829342 kubelet[2307]: I0412 18:53:48.829320 2307 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:53:48.829611 kubelet[2307]: I0412 18:53:48.829591 2307 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:53:48.829808 kubelet[2307]: I0412 18:53:48.829786 2307 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:53:48.829950 kubelet[2307]: I0412 18:53:48.829818 2307 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:53:48.829950 kubelet[2307]: I0412 18:53:48.829831 2307 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:53:48.830038 kubelet[2307]: I0412 18:53:48.829953 2307 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:48.830081 kubelet[2307]: I0412 18:53:48.830060 2307 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:53:48.830081 kubelet[2307]: I0412 18:53:48.830078 2307 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:53:48.830154 kubelet[2307]: I0412 18:53:48.830108 2307 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:53:48.830154 kubelet[2307]: I0412 18:53:48.830126 2307 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:53:48.831038 kubelet[2307]: W0412 18:53:48.830862 2307 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.22.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-22-226&limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.831038 kubelet[2307]: E0412 18:53:48.830915 2307 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.22.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-22-226&limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.831038 kubelet[2307]: W0412 18:53:48.830978 2307 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.22.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.831038 kubelet[2307]: E0412 18:53:48.831016 2307 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.22.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.831331 kubelet[2307]: I0412 18:53:48.831107 2307 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:53:48.831413 kubelet[2307]: I0412 18:53:48.831399 2307 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:53:48.831474 kubelet[2307]: W0412 18:53:48.831462 2307 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:53:48.833356 kubelet[2307]: I0412 18:53:48.833339 2307 server.go:1256] "Started kubelet" Apr 12 18:53:48.837072 kubelet[2307]: E0412 18:53:48.837035 2307 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.22.226:6443/api/v1/namespaces/default/events\": dial tcp 172.31.22.226:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-22-226.17c59d28193c6ee3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-22-226,UID:ip-172-31-22-226,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-22-226,},FirstTimestamp:2024-04-12 18:53:48.831985379 +0000 UTC m=+0.567878821,LastTimestamp:2024-04-12 18:53:48.831985379 +0000 UTC m=+0.567878821,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-22-226,}" Apr 12 18:53:48.839053 kubelet[2307]: I0412 18:53:48.839037 2307 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:53:48.841203 kubelet[2307]: I0412 18:53:48.841183 2307 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:53:48.843942 kubelet[2307]: I0412 18:53:48.843923 2307 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:53:48.844347 kubelet[2307]: I0412 18:53:48.844332 2307 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:53:48.844000 audit[2307]: AVC avc: denied { mac_admin } for pid=2307 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.844000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:48.844000 audit[2307]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dab020 a1=c000d70768 a2=c000daaff0 a3=25 items=0 ppid=1 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.844000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:48.844000 audit[2307]: AVC avc: denied { mac_admin } for pid=2307 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.844000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:48.844000 audit[2307]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d4be40 a1=c000d70780 a2=c000dab0b0 a3=25 items=0 ppid=1 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.844000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:48.845706 kubelet[2307]: I0412 18:53:48.845160 2307 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:53:48.845706 kubelet[2307]: I0412 18:53:48.845205 2307 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:53:48.845706 kubelet[2307]: I0412 18:53:48.845347 2307 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:53:48.847249 kubelet[2307]: E0412 18:53:48.847229 2307 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:53:48.850417 kubelet[2307]: E0412 18:53:48.850399 2307 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ip-172-31-22-226\" not found" Apr 12 18:53:48.850526 kubelet[2307]: I0412 18:53:48.850440 2307 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:53:48.850574 kubelet[2307]: I0412 18:53:48.850549 2307 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:53:48.850644 kubelet[2307]: I0412 18:53:48.850623 2307 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:53:48.851010 kubelet[2307]: W0412 18:53:48.850965 2307 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.22.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.851077 kubelet[2307]: E0412 18:53:48.851016 2307 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.22.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.851257 kubelet[2307]: E0412 18:53:48.851231 2307 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-226?timeout=10s\": dial tcp 172.31.22.226:6443: connect: connection refused" interval="200ms" Apr 12 18:53:48.851661 kubelet[2307]: I0412 18:53:48.851640 2307 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:53:48.851730 kubelet[2307]: I0412 18:53:48.851712 2307 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:53:48.852868 kubelet[2307]: I0412 18:53:48.852846 2307 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:53:48.855000 audit[2318]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:48.855000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0b157470 a2=0 a3=7fff0b15745c items=0 ppid=2307 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:53:48.858000 audit[2319]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:48.858000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6b1dc9a0 a2=0 a3=7fff6b1dc98c items=0 ppid=2307 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:53:48.860000 audit[2321]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:48.860000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffeb051110 a2=0 a3=7fffeb0510fc items=0 ppid=2307 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:48.863000 audit[2323]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:48.863000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd981ec770 a2=0 a3=7ffd981ec75c items=0 ppid=2307 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:48.875000 audit[2326]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:48.875000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe5dce2ad0 a2=0 a3=7ffe5dce2abc items=0 ppid=2307 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:53:48.876569 kubelet[2307]: I0412 18:53:48.876352 2307 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:53:48.881000 audit[2329]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:48.881000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffece3785f0 a2=0 a3=7ffece3785dc items=0 ppid=2307 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:53:48.882131 kubelet[2307]: I0412 18:53:48.882104 2307 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:53:48.882228 kubelet[2307]: I0412 18:53:48.882141 2307 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:53:48.882228 kubelet[2307]: I0412 18:53:48.882165 2307 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:53:48.882408 kubelet[2307]: E0412 18:53:48.882233 2307 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:53:48.883782 kubelet[2307]: W0412 18:53:48.883756 2307 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.22.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.883922 kubelet[2307]: E0412 18:53:48.883911 2307 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.22.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:48.884000 audit[2330]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:48.884000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4d3ac9c0 a2=0 a3=7ffc4d3ac9ac items=0 ppid=2307 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:53:48.885696 kubelet[2307]: I0412 18:53:48.885673 2307 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:53:48.885696 kubelet[2307]: I0412 18:53:48.885693 2307 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:53:48.885821 kubelet[2307]: I0412 18:53:48.885710 2307 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:48.887000 audit[2333]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:48.887000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff170a5410 a2=0 a3=7fff170a53fc items=0 ppid=2307 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:53:48.887000 audit[2332]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:48.887000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda760a440 a2=0 a3=7ffda760a42c items=0 ppid=2307 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:53:48.888000 audit[2337]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:48.888000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6c4726c0 a2=0 a3=7ffd6c4726ac items=0 ppid=2307 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:53:48.888000 audit[2336]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:48.888000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd5e04a170 a2=0 a3=7ffd5e04a15c items=0 ppid=2307 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:53:48.889000 audit[2338]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:48.889000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde207f940 a2=0 a3=7ffde207f92c items=0 ppid=2307 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:53:48.891093 kubelet[2307]: I0412 18:53:48.890824 2307 policy_none.go:49] "None policy: Start" Apr 12 18:53:48.891574 kubelet[2307]: I0412 18:53:48.891553 2307 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:53:48.891658 kubelet[2307]: I0412 18:53:48.891580 2307 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:53:48.897336 systemd[1]: Created slice kubepods.slice. Apr 12 18:53:48.901933 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:53:48.909739 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:53:48.911073 kubelet[2307]: I0412 18:53:48.911041 2307 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:53:48.910000 audit[2307]: AVC avc: denied { mac_admin } for pid=2307 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.910000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:48.910000 audit[2307]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c11bf0 a1=c000f1a4f8 a2=c000c11bc0 a3=25 items=0 ppid=1 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.910000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:48.911463 kubelet[2307]: I0412 18:53:48.911117 2307 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:53:48.911463 kubelet[2307]: I0412 18:53:48.911317 2307 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:53:48.913821 kubelet[2307]: E0412 18:53:48.913793 2307 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-22-226\" not found" Apr 12 18:53:48.952850 kubelet[2307]: I0412 18:53:48.952821 2307 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-22-226" Apr 12 18:53:48.953200 kubelet[2307]: E0412 18:53:48.953172 2307 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.22.226:6443/api/v1/nodes\": dial tcp 172.31.22.226:6443: connect: connection refused" node="ip-172-31-22-226" Apr 12 18:53:48.982527 kubelet[2307]: I0412 18:53:48.982482 2307 topology_manager.go:215] "Topology Admit Handler" podUID="d23375cc8b2eb6c03fab7e535ce19bda" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-22-226" Apr 12 18:53:48.983947 kubelet[2307]: I0412 18:53:48.983925 2307 topology_manager.go:215] "Topology Admit Handler" podUID="3e046c48c054eb6da874a728dc6f5481" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:48.985412 kubelet[2307]: I0412 18:53:48.985395 2307 topology_manager.go:215] "Topology Admit Handler" podUID="a66c3001279e05b1cee23a4de543542f" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-22-226" Apr 12 18:53:48.991411 systemd[1]: Created slice kubepods-burstable-podd23375cc8b2eb6c03fab7e535ce19bda.slice. Apr 12 18:53:49.006502 systemd[1]: Created slice kubepods-burstable-poda66c3001279e05b1cee23a4de543542f.slice. Apr 12 18:53:49.010537 systemd[1]: Created slice kubepods-burstable-pod3e046c48c054eb6da874a728dc6f5481.slice. Apr 12 18:53:49.051965 kubelet[2307]: I0412 18:53:49.051931 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-kubeconfig\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:49.052210 kubelet[2307]: E0412 18:53:49.051994 2307 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-226?timeout=10s\": dial tcp 172.31.22.226:6443: connect: connection refused" interval="400ms" Apr 12 18:53:49.052296 kubelet[2307]: I0412 18:53:49.052283 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:49.052452 kubelet[2307]: I0412 18:53:49.052439 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a66c3001279e05b1cee23a4de543542f-kubeconfig\") pod \"kube-scheduler-ip-172-31-22-226\" (UID: \"a66c3001279e05b1cee23a4de543542f\") " pod="kube-system/kube-scheduler-ip-172-31-22-226" Apr 12 18:53:49.052571 kubelet[2307]: I0412 18:53:49.052547 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d23375cc8b2eb6c03fab7e535ce19bda-ca-certs\") pod \"kube-apiserver-ip-172-31-22-226\" (UID: \"d23375cc8b2eb6c03fab7e535ce19bda\") " pod="kube-system/kube-apiserver-ip-172-31-22-226" Apr 12 18:53:49.052640 kubelet[2307]: I0412 18:53:49.052624 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d23375cc8b2eb6c03fab7e535ce19bda-k8s-certs\") pod \"kube-apiserver-ip-172-31-22-226\" (UID: \"d23375cc8b2eb6c03fab7e535ce19bda\") " pod="kube-system/kube-apiserver-ip-172-31-22-226" Apr 12 18:53:49.052701 kubelet[2307]: I0412 18:53:49.052658 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-k8s-certs\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:49.052746 kubelet[2307]: I0412 18:53:49.052703 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d23375cc8b2eb6c03fab7e535ce19bda-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-22-226\" (UID: \"d23375cc8b2eb6c03fab7e535ce19bda\") " pod="kube-system/kube-apiserver-ip-172-31-22-226" Apr 12 18:53:49.052746 kubelet[2307]: I0412 18:53:49.052734 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-ca-certs\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:49.052829 kubelet[2307]: I0412 18:53:49.052770 2307 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:49.155084 kubelet[2307]: I0412 18:53:49.154988 2307 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-22-226" Apr 12 18:53:49.160908 kubelet[2307]: E0412 18:53:49.160882 2307 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.22.226:6443/api/v1/nodes\": dial tcp 172.31.22.226:6443: connect: connection refused" node="ip-172-31-22-226" Apr 12 18:53:49.305260 env[1648]: time="2024-04-12T18:53:49.305205834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-22-226,Uid:d23375cc8b2eb6c03fab7e535ce19bda,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:49.309936 env[1648]: time="2024-04-12T18:53:49.309900805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-22-226,Uid:a66c3001279e05b1cee23a4de543542f,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:49.313945 env[1648]: time="2024-04-12T18:53:49.313897806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-22-226,Uid:3e046c48c054eb6da874a728dc6f5481,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:49.453560 kubelet[2307]: E0412 18:53:49.453465 2307 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-226?timeout=10s\": dial tcp 172.31.22.226:6443: connect: connection refused" interval="800ms" Apr 12 18:53:49.563350 kubelet[2307]: I0412 18:53:49.563321 2307 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-22-226" Apr 12 18:53:49.563675 kubelet[2307]: E0412 18:53:49.563650 2307 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.22.226:6443/api/v1/nodes\": dial tcp 172.31.22.226:6443: connect: connection refused" node="ip-172-31-22-226" Apr 12 18:53:49.686558 kubelet[2307]: W0412 18:53:49.686495 2307 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.22.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:49.686558 kubelet[2307]: E0412 18:53:49.686561 2307 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.22.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:49.842764 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount556566298.mount: Deactivated successfully. Apr 12 18:53:49.874736 env[1648]: time="2024-04-12T18:53:49.874670058Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.895104 env[1648]: time="2024-04-12T18:53:49.895034619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.897327 env[1648]: time="2024-04-12T18:53:49.897201584Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.897480 kubelet[2307]: W0412 18:53:49.897193 2307 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.22.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-22-226&limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:49.897480 kubelet[2307]: E0412 18:53:49.897279 2307 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.22.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-22-226&limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:49.900048 env[1648]: time="2024-04-12T18:53:49.899996313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.901839 env[1648]: time="2024-04-12T18:53:49.901792332Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.903464 env[1648]: time="2024-04-12T18:53:49.903431950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.905322 env[1648]: time="2024-04-12T18:53:49.905295424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.906687 env[1648]: time="2024-04-12T18:53:49.906654562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.907806 env[1648]: time="2024-04-12T18:53:49.907778728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.909707 env[1648]: time="2024-04-12T18:53:49.909672821Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.910719 env[1648]: time="2024-04-12T18:53:49.910689870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.921756 env[1648]: time="2024-04-12T18:53:49.921707931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:49.952581 env[1648]: time="2024-04-12T18:53:49.942665410Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:49.952581 env[1648]: time="2024-04-12T18:53:49.942705085Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:49.952581 env[1648]: time="2024-04-12T18:53:49.942715383Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:49.952581 env[1648]: time="2024-04-12T18:53:49.943019454Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8fecb40af979031a4cb288d5b9090960fe7aaec5a455d041166322061eb77bc pid=2346 runtime=io.containerd.runc.v2 Apr 12 18:53:49.979321 env[1648]: time="2024-04-12T18:53:49.979226668Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:49.979526 env[1648]: time="2024-04-12T18:53:49.979288764Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:49.979526 env[1648]: time="2024-04-12T18:53:49.979313744Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:49.985767 env[1648]: time="2024-04-12T18:53:49.985532093Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:49.985767 env[1648]: time="2024-04-12T18:53:49.985586404Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:49.985767 env[1648]: time="2024-04-12T18:53:49.985603217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:49.986103 env[1648]: time="2024-04-12T18:53:49.985774491Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/709e11256168b65ebfb1d180b271050cd2f012c8edb854eba5202a8297c7d7c4 pid=2371 runtime=io.containerd.runc.v2 Apr 12 18:53:49.987436 env[1648]: time="2024-04-12T18:53:49.987352924Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e7dda8d02b52f7514781bb54ae9ff56daa3533c3f76f5602abe7856707ab0ac pid=2381 runtime=io.containerd.runc.v2 Apr 12 18:53:49.994753 systemd[1]: Started cri-containerd-b8fecb40af979031a4cb288d5b9090960fe7aaec5a455d041166322061eb77bc.scope. Apr 12 18:53:50.004284 kubelet[2307]: W0412 18:53:50.004243 2307 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.22.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:50.004544 kubelet[2307]: E0412 18:53:50.004297 2307 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.22.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.027000 audit: BPF prog-id=76 op=LOAD Apr 12 18:53:50.028000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.028000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2346 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238666563623430616639373930333161346362323838643562393039 Apr 12 18:53:50.028000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.028000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2346 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238666563623430616639373930333161346362323838643562393039 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.029000 audit: BPF prog-id=77 op=LOAD Apr 12 18:53:50.029000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ce5e0 items=0 ppid=2346 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238666563623430616639373930333161346362323838643562393039 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.030000 audit: BPF prog-id=78 op=LOAD Apr 12 18:53:50.030000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ce628 items=0 ppid=2346 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238666563623430616639373930333161346362323838643562393039 Apr 12 18:53:50.031000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:53:50.031000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.031000 audit: BPF prog-id=79 op=LOAD Apr 12 18:53:50.031000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003cea38 items=0 ppid=2346 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238666563623430616639373930333161346362323838643562393039 Apr 12 18:53:50.056763 systemd[1]: Started cri-containerd-6e7dda8d02b52f7514781bb54ae9ff56daa3533c3f76f5602abe7856707ab0ac.scope. Apr 12 18:53:50.062103 systemd[1]: Started cri-containerd-709e11256168b65ebfb1d180b271050cd2f012c8edb854eba5202a8297c7d7c4.scope. Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.101000 audit: BPF prog-id=80 op=LOAD Apr 12 18:53:50.101000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.101000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2371 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730396531313235363136386236356562666231643138306232373130 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2371 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730396531313235363136386236356562666231643138306232373130 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit: BPF prog-id=81 op=LOAD Apr 12 18:53:50.102000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000287ce0 items=0 ppid=2371 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730396531313235363136386236356562666231643138306232373130 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.102000 audit: BPF prog-id=82 op=LOAD Apr 12 18:53:50.102000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000287d28 items=0 ppid=2371 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730396531313235363136386236356562666231643138306232373130 Apr 12 18:53:50.102000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:53:50.102000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.103000 audit: BPF prog-id=83 op=LOAD Apr 12 18:53:50.103000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000406138 items=0 ppid=2371 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730396531313235363136386236356562666231643138306232373130 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.110000 audit: BPF prog-id=84 op=LOAD Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2381 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376464613864303262353266373531343738316262353461653966 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2381 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376464613864303262353266373531343738316262353461653966 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit: BPF prog-id=85 op=LOAD Apr 12 18:53:50.111000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002190f0 items=0 ppid=2381 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376464613864303262353266373531343738316262353461653966 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit: BPF prog-id=86 op=LOAD Apr 12 18:53:50.111000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000219138 items=0 ppid=2381 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376464613864303262353266373531343738316262353461653966 Apr 12 18:53:50.111000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:53:50.111000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.111000 audit: BPF prog-id=87 op=LOAD Apr 12 18:53:50.111000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000219548 items=0 ppid=2381 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376464613864303262353266373531343738316262353461653966 Apr 12 18:53:50.121079 env[1648]: time="2024-04-12T18:53:50.121031253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-22-226,Uid:d23375cc8b2eb6c03fab7e535ce19bda,Namespace:kube-system,Attempt:0,} returns sandbox id \"b8fecb40af979031a4cb288d5b9090960fe7aaec5a455d041166322061eb77bc\"" Apr 12 18:53:50.132683 env[1648]: time="2024-04-12T18:53:50.132639288Z" level=info msg="CreateContainer within sandbox \"b8fecb40af979031a4cb288d5b9090960fe7aaec5a455d041166322061eb77bc\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:53:50.171005 env[1648]: time="2024-04-12T18:53:50.170954891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-22-226,Uid:3e046c48c054eb6da874a728dc6f5481,Namespace:kube-system,Attempt:0,} returns sandbox id \"6e7dda8d02b52f7514781bb54ae9ff56daa3533c3f76f5602abe7856707ab0ac\"" Apr 12 18:53:50.173063 env[1648]: time="2024-04-12T18:53:50.172606359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-22-226,Uid:a66c3001279e05b1cee23a4de543542f,Namespace:kube-system,Attempt:0,} returns sandbox id \"709e11256168b65ebfb1d180b271050cd2f012c8edb854eba5202a8297c7d7c4\"" Apr 12 18:53:50.194048 env[1648]: time="2024-04-12T18:53:50.193999193Z" level=info msg="CreateContainer within sandbox \"6e7dda8d02b52f7514781bb54ae9ff56daa3533c3f76f5602abe7856707ab0ac\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:53:50.195690 env[1648]: time="2024-04-12T18:53:50.195655850Z" level=info msg="CreateContainer within sandbox \"709e11256168b65ebfb1d180b271050cd2f012c8edb854eba5202a8297c7d7c4\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:53:50.255693 kubelet[2307]: E0412 18:53:50.254352 2307 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-226?timeout=10s\": dial tcp 172.31.22.226:6443: connect: connection refused" interval="1.6s" Apr 12 18:53:50.305251 kubelet[2307]: W0412 18:53:50.305190 2307 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.22.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:50.305251 kubelet[2307]: E0412 18:53:50.305255 2307 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.22.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:50.309884 env[1648]: time="2024-04-12T18:53:50.309835807Z" level=info msg="CreateContainer within sandbox \"b8fecb40af979031a4cb288d5b9090960fe7aaec5a455d041166322061eb77bc\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"92ed4c9e06b800c73a0be58deb386dc138d87ff552929ea9cb1942323432d6bb\"" Apr 12 18:53:50.310675 env[1648]: time="2024-04-12T18:53:50.310643669Z" level=info msg="StartContainer for \"92ed4c9e06b800c73a0be58deb386dc138d87ff552929ea9cb1942323432d6bb\"" Apr 12 18:53:50.331730 systemd[1]: Started cri-containerd-92ed4c9e06b800c73a0be58deb386dc138d87ff552929ea9cb1942323432d6bb.scope. Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.362000 audit: BPF prog-id=88 op=LOAD Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2346 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656434633965303662383030633733613062653538646562333836 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2346 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656434633965303662383030633733613062653538646562333836 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit: BPF prog-id=89 op=LOAD Apr 12 18:53:50.363000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000241070 items=0 ppid=2346 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656434633965303662383030633733613062653538646562333836 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit: BPF prog-id=90 op=LOAD Apr 12 18:53:50.363000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002410b8 items=0 ppid=2346 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656434633965303662383030633733613062653538646562333836 Apr 12 18:53:50.363000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:53:50.363000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.363000 audit: BPF prog-id=91 op=LOAD Apr 12 18:53:50.363000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002414c8 items=0 ppid=2346 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656434633965303662383030633733613062653538646562333836 Apr 12 18:53:50.376552 kubelet[2307]: I0412 18:53:50.366090 2307 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-22-226" Apr 12 18:53:50.376552 kubelet[2307]: E0412 18:53:50.366575 2307 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.22.226:6443/api/v1/nodes\": dial tcp 172.31.22.226:6443: connect: connection refused" node="ip-172-31-22-226" Apr 12 18:53:50.413839 env[1648]: time="2024-04-12T18:53:50.413784804Z" level=info msg="StartContainer for \"92ed4c9e06b800c73a0be58deb386dc138d87ff552929ea9cb1942323432d6bb\" returns successfully" Apr 12 18:53:50.424988 env[1648]: time="2024-04-12T18:53:50.424940360Z" level=info msg="CreateContainer within sandbox \"709e11256168b65ebfb1d180b271050cd2f012c8edb854eba5202a8297c7d7c4\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876\"" Apr 12 18:53:50.425581 env[1648]: time="2024-04-12T18:53:50.425547465Z" level=info msg="StartContainer for \"c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876\"" Apr 12 18:53:50.448605 systemd[1]: Started cri-containerd-c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876.scope. Apr 12 18:53:50.453965 env[1648]: time="2024-04-12T18:53:50.453889345Z" level=info msg="CreateContainer within sandbox \"6e7dda8d02b52f7514781bb54ae9ff56daa3533c3f76f5602abe7856707ab0ac\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530\"" Apr 12 18:53:50.454720 env[1648]: time="2024-04-12T18:53:50.454682827Z" level=info msg="StartContainer for \"dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530\"" Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.481000 audit: BPF prog-id=92 op=LOAD Apr 12 18:53:50.484481 systemd[1]: Started cri-containerd-dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530.scope. Apr 12 18:53:50.485000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.485000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2371 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332386631323338646665303763363137306562313031336535326630 Apr 12 18:53:50.485000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.485000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2371 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332386631323338646665303763363137306562313031336535326630 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.486000 audit: BPF prog-id=93 op=LOAD Apr 12 18:53:50.486000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002a11e0 items=0 ppid=2371 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332386631323338646665303763363137306562313031336535326630 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.487000 audit: BPF prog-id=94 op=LOAD Apr 12 18:53:50.487000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002a1228 items=0 ppid=2371 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332386631323338646665303763363137306562313031336535326630 Apr 12 18:53:50.488000 audit: BPF prog-id=94 op=UNLOAD Apr 12 18:53:50.488000 audit: BPF prog-id=93 op=UNLOAD Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.488000 audit: BPF prog-id=95 op=LOAD Apr 12 18:53:50.488000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002a1638 items=0 ppid=2371 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332386631323338646665303763363137306562313031336535326630 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.508000 audit: BPF prog-id=96 op=LOAD Apr 12 18:53:50.509000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.509000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2381 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463373164383664303135386537303531613039633236363062636634 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2381 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463373164383664303135386537303531613039633236363062636634 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.510000 audit: BPF prog-id=97 op=LOAD Apr 12 18:53:50.510000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221a20 items=0 ppid=2381 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463373164383664303135386537303531613039633236363062636634 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.511000 audit: BPF prog-id=98 op=LOAD Apr 12 18:53:50.511000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221a68 items=0 ppid=2381 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463373164383664303135386537303531613039633236363062636634 Apr 12 18:53:50.512000 audit: BPF prog-id=98 op=UNLOAD Apr 12 18:53:50.512000 audit: BPF prog-id=97 op=UNLOAD Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:50.512000 audit: BPF prog-id=99 op=LOAD Apr 12 18:53:50.512000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221e78 items=0 ppid=2381 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463373164383664303135386537303531613039633236363062636634 Apr 12 18:53:50.548293 env[1648]: time="2024-04-12T18:53:50.548240583Z" level=info msg="StartContainer for \"c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876\" returns successfully" Apr 12 18:53:50.568248 env[1648]: time="2024-04-12T18:53:50.568206578Z" level=info msg="StartContainer for \"dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530\" returns successfully" Apr 12 18:53:51.016802 kubelet[2307]: E0412 18:53:51.016737 2307 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.22.226:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.22.226:6443: connect: connection refused Apr 12 18:53:51.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:51.486496 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 18:53:51.504000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:53:51.504000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:53:51.504000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:53:51.968994 kubelet[2307]: I0412 18:53:51.968972 2307 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-22-226" Apr 12 18:53:52.390000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:52.390000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00042af90 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:53:52.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:52.391000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:52.391000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004e4400 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:53:52.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:53.324416 kernel: kauditd_printk_skb: 663 callbacks suppressed Apr 12 18:53:53.324702 kernel: audit: type=1400 audit(1712948033.322:735): avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.322000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.322000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003da8090 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.340389 kernel: audit: type=1300 audit(1712948033.322:735): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003da8090 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.322000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.354922 kernel: audit: type=1327 audit(1712948033.322:735): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.355046 kernel: audit: type=1400 audit(1712948033.322:736): avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.322000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.364090 kernel: audit: type=1300 audit(1712948033.322:736): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0060656a0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.322000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0060656a0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.322000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.372381 kernel: audit: type=1327 audit(1712948033.322:736): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.322000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520983 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.392382 kernel: audit: type=1400 audit(1712948033.322:737): avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520983 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.322000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003da95f0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.405384 kernel: audit: type=1300 audit(1712948033.322:737): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003da95f0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.322000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.428017 kernel: audit: type=1327 audit(1712948033.322:737): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.428155 kernel: audit: type=1400 audit(1712948033.365:738): avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.365000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.365000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c002606ac0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.365000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.365000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006800300 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.441000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:53.441000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c005f3f2c0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:53:53.441000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:53:53.519344 kubelet[2307]: E0412 18:53:53.519303 2307 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-22-226\" not found" node="ip-172-31-22-226" Apr 12 18:53:53.598018 kubelet[2307]: I0412 18:53:53.597908 2307 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-22-226" Apr 12 18:53:53.833111 kubelet[2307]: I0412 18:53:53.833060 2307 apiserver.go:52] "Watching apiserver" Apr 12 18:53:53.851549 kubelet[2307]: I0412 18:53:53.851430 2307 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:53:54.502583 amazon-ssm-agent[1791]: 2024-04-12 18:53:54 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Apr 12 18:53:56.363962 systemd[1]: Reloading. Apr 12 18:53:56.499339 /usr/lib/systemd/system-generators/torcx-generator[2605]: time="2024-04-12T18:53:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:56.499403 /usr/lib/systemd/system-generators/torcx-generator[2605]: time="2024-04-12T18:53:56Z" level=info msg="torcx already run" Apr 12 18:53:56.579598 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:56.579623 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:56.600919 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit: BPF prog-id=100 op=LOAD Apr 12 18:53:56.682000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit: BPF prog-id=101 op=LOAD Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.683000 audit: BPF prog-id=102 op=LOAD Apr 12 18:53:56.683000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:53:56.684000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.685000 audit: BPF prog-id=103 op=LOAD Apr 12 18:53:56.686000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:53:56.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.688000 audit: BPF prog-id=104 op=LOAD Apr 12 18:53:56.689000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.689000 audit: BPF prog-id=105 op=LOAD Apr 12 18:53:56.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.690000 audit: BPF prog-id=106 op=LOAD Apr 12 18:53:56.690000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:53:56.690000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit: BPF prog-id=107 op=LOAD Apr 12 18:53:56.692000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.693000 audit: BPF prog-id=108 op=LOAD Apr 12 18:53:56.693000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit: BPF prog-id=109 op=LOAD Apr 12 18:53:56.696000 audit: BPF prog-id=92 op=UNLOAD Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit: BPF prog-id=110 op=LOAD Apr 12 18:53:56.697000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit: BPF prog-id=111 op=LOAD Apr 12 18:53:56.698000 audit: BPF prog-id=96 op=UNLOAD Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.698000 audit: BPF prog-id=112 op=LOAD Apr 12 18:53:56.698000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit: BPF prog-id=113 op=LOAD Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.699000 audit: BPF prog-id=114 op=LOAD Apr 12 18:53:56.699000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:53:56.699000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.700000 audit: BPF prog-id=115 op=LOAD Apr 12 18:53:56.700000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.701000 audit: BPF prog-id=116 op=LOAD Apr 12 18:53:56.701000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit: BPF prog-id=117 op=LOAD Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit: BPF prog-id=118 op=LOAD Apr 12 18:53:56.702000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:53:56.702000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.702000 audit: BPF prog-id=119 op=LOAD Apr 12 18:53:56.702000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.704000 audit: BPF prog-id=120 op=LOAD Apr 12 18:53:56.704000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:53:56.722505 kubelet[2307]: I0412 18:53:56.722440 2307 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:56.724928 systemd[1]: Stopping kubelet.service... Apr 12 18:53:56.740722 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:53:56.740955 systemd[1]: Stopped kubelet.service. Apr 12 18:53:56.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:56.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:56.743215 systemd[1]: Started kubelet.service. Apr 12 18:53:56.833516 kubelet[2657]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:56.833516 kubelet[2657]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:53:56.833516 kubelet[2657]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:56.834057 kubelet[2657]: I0412 18:53:56.833597 2657 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:53:56.850460 kubelet[2657]: I0412 18:53:56.850423 2657 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:53:56.850460 kubelet[2657]: I0412 18:53:56.850452 2657 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:53:56.850719 kubelet[2657]: I0412 18:53:56.850707 2657 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:53:56.852205 kubelet[2657]: I0412 18:53:56.852171 2657 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:53:56.854332 kubelet[2657]: I0412 18:53:56.854310 2657 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:56.859936 kubelet[2657]: I0412 18:53:56.859908 2657 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:53:56.860162 kubelet[2657]: I0412 18:53:56.860142 2657 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:53:56.860344 kubelet[2657]: I0412 18:53:56.860323 2657 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:53:56.860604 kubelet[2657]: I0412 18:53:56.860353 2657 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:53:56.860604 kubelet[2657]: I0412 18:53:56.860392 2657 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:53:56.860604 kubelet[2657]: I0412 18:53:56.860431 2657 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:56.860604 kubelet[2657]: I0412 18:53:56.860550 2657 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:53:56.860604 kubelet[2657]: I0412 18:53:56.860567 2657 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:53:56.862442 kubelet[2657]: I0412 18:53:56.862422 2657 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:53:56.862547 kubelet[2657]: I0412 18:53:56.862538 2657 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:53:56.878011 kubelet[2657]: I0412 18:53:56.877981 2657 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:53:56.878207 kubelet[2657]: I0412 18:53:56.878196 2657 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:53:56.879696 kubelet[2657]: I0412 18:53:56.878723 2657 server.go:1256] "Started kubelet" Apr 12 18:53:56.881000 audit[2657]: AVC avc: denied { mac_admin } for pid=2657 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.881000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:56.881000 audit[2657]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a81bc0 a1=c000adc840 a2=c000a81b90 a3=25 items=0 ppid=1 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:56.881000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:56.881000 audit[2657]: AVC avc: denied { mac_admin } for pid=2657 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:56.881000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:56.881000 audit[2657]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000af62c0 a1=c000adc858 a2=c000a81c50 a3=25 items=0 ppid=1 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:56.881000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:56.882801 kubelet[2657]: I0412 18:53:56.881978 2657 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:53:56.882801 kubelet[2657]: I0412 18:53:56.882087 2657 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:53:56.882801 kubelet[2657]: I0412 18:53:56.882125 2657 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:53:56.889772 kubelet[2657]: I0412 18:53:56.889752 2657 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:53:56.893062 kubelet[2657]: I0412 18:53:56.893038 2657 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:53:56.896727 kubelet[2657]: I0412 18:53:56.896700 2657 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:53:56.897169 kubelet[2657]: I0412 18:53:56.896705 2657 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:53:56.897564 kubelet[2657]: I0412 18:53:56.897531 2657 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:53:56.899617 kubelet[2657]: I0412 18:53:56.898405 2657 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:53:56.899960 kubelet[2657]: I0412 18:53:56.898608 2657 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:53:56.908989 kubelet[2657]: I0412 18:53:56.908949 2657 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:53:56.913347 kubelet[2657]: E0412 18:53:56.913034 2657 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:53:56.913815 kubelet[2657]: I0412 18:53:56.913801 2657 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:53:56.913950 kubelet[2657]: I0412 18:53:56.913938 2657 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:53:56.926646 kubelet[2657]: I0412 18:53:56.926598 2657 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:53:56.942026 kubelet[2657]: I0412 18:53:56.941933 2657 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:53:56.942214 kubelet[2657]: I0412 18:53:56.942198 2657 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:53:56.943099 kubelet[2657]: I0412 18:53:56.943080 2657 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:53:56.943776 kubelet[2657]: E0412 18:53:56.943762 2657 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:53:57.001644 kubelet[2657]: I0412 18:53:57.001615 2657 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-22-226" Apr 12 18:53:57.013153 kubelet[2657]: I0412 18:53:57.013123 2657 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:53:57.013153 kubelet[2657]: I0412 18:53:57.013151 2657 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:53:57.013338 kubelet[2657]: I0412 18:53:57.013170 2657 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:57.013411 kubelet[2657]: I0412 18:53:57.013392 2657 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:53:57.013455 kubelet[2657]: I0412 18:53:57.013419 2657 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:53:57.013455 kubelet[2657]: I0412 18:53:57.013429 2657 policy_none.go:49] "None policy: Start" Apr 12 18:53:57.014377 kubelet[2657]: I0412 18:53:57.014336 2657 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:53:57.014469 kubelet[2657]: I0412 18:53:57.014382 2657 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:53:57.014581 kubelet[2657]: I0412 18:53:57.014563 2657 state_mem.go:75] "Updated machine memory state" Apr 12 18:53:57.022422 kubelet[2657]: I0412 18:53:57.019788 2657 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-22-226" Apr 12 18:53:57.022422 kubelet[2657]: I0412 18:53:57.019874 2657 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-22-226" Apr 12 18:53:57.026865 kubelet[2657]: I0412 18:53:57.026837 2657 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:53:57.026961 kubelet[2657]: I0412 18:53:57.026899 2657 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:53:57.026000 audit[2657]: AVC avc: denied { mac_admin } for pid=2657 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.026000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:57.026000 audit[2657]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011ba240 a1=c0011b4888 a2=c0011ba210 a3=25 items=0 ppid=1 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.026000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:57.030663 kubelet[2657]: I0412 18:53:57.030647 2657 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:53:57.050843 kubelet[2657]: I0412 18:53:57.050819 2657 topology_manager.go:215] "Topology Admit Handler" podUID="3e046c48c054eb6da874a728dc6f5481" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:57.052660 kubelet[2657]: I0412 18:53:57.052519 2657 topology_manager.go:215] "Topology Admit Handler" podUID="a66c3001279e05b1cee23a4de543542f" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-22-226" Apr 12 18:53:57.052847 kubelet[2657]: I0412 18:53:57.052681 2657 topology_manager.go:215] "Topology Admit Handler" podUID="d23375cc8b2eb6c03fab7e535ce19bda" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-22-226" Apr 12 18:53:57.063860 kubelet[2657]: E0412 18:53:57.063827 2657 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-22-226\" already exists" pod="kube-system/kube-scheduler-ip-172-31-22-226" Apr 12 18:53:57.101787 kubelet[2657]: I0412 18:53:57.101741 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-ca-certs\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:57.101787 kubelet[2657]: I0412 18:53:57.101791 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-kubeconfig\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:57.102027 kubelet[2657]: I0412 18:53:57.101827 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:57.102027 kubelet[2657]: I0412 18:53:57.101854 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a66c3001279e05b1cee23a4de543542f-kubeconfig\") pod \"kube-scheduler-ip-172-31-22-226\" (UID: \"a66c3001279e05b1cee23a4de543542f\") " pod="kube-system/kube-scheduler-ip-172-31-22-226" Apr 12 18:53:57.102027 kubelet[2657]: I0412 18:53:57.101880 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d23375cc8b2eb6c03fab7e535ce19bda-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-22-226\" (UID: \"d23375cc8b2eb6c03fab7e535ce19bda\") " pod="kube-system/kube-apiserver-ip-172-31-22-226" Apr 12 18:53:57.102027 kubelet[2657]: I0412 18:53:57.101906 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:57.102027 kubelet[2657]: I0412 18:53:57.101931 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3e046c48c054eb6da874a728dc6f5481-k8s-certs\") pod \"kube-controller-manager-ip-172-31-22-226\" (UID: \"3e046c48c054eb6da874a728dc6f5481\") " pod="kube-system/kube-controller-manager-ip-172-31-22-226" Apr 12 18:53:57.102183 kubelet[2657]: I0412 18:53:57.101956 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d23375cc8b2eb6c03fab7e535ce19bda-ca-certs\") pod \"kube-apiserver-ip-172-31-22-226\" (UID: \"d23375cc8b2eb6c03fab7e535ce19bda\") " pod="kube-system/kube-apiserver-ip-172-31-22-226" Apr 12 18:53:57.102183 kubelet[2657]: I0412 18:53:57.101985 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d23375cc8b2eb6c03fab7e535ce19bda-k8s-certs\") pod \"kube-apiserver-ip-172-31-22-226\" (UID: \"d23375cc8b2eb6c03fab7e535ce19bda\") " pod="kube-system/kube-apiserver-ip-172-31-22-226" Apr 12 18:53:57.877517 kubelet[2657]: I0412 18:53:57.877460 2657 apiserver.go:52] "Watching apiserver" Apr 12 18:53:57.900333 kubelet[2657]: I0412 18:53:57.900299 2657 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:53:58.064629 kubelet[2657]: E0412 18:53:58.064600 2657 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-22-226\" already exists" pod="kube-system/kube-apiserver-ip-172-31-22-226" Apr 12 18:53:58.145047 kubelet[2657]: I0412 18:53:58.144913 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-22-226" podStartSLOduration=1.144825357 podStartE2EDuration="1.144825357s" podCreationTimestamp="2024-04-12 18:53:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:58.112669301 +0000 UTC m=+1.361143848" watchObservedRunningTime="2024-04-12 18:53:58.144825357 +0000 UTC m=+1.393299901" Apr 12 18:53:58.178854 kubelet[2657]: I0412 18:53:58.178822 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-22-226" podStartSLOduration=1.178758712 podStartE2EDuration="1.178758712s" podCreationTimestamp="2024-04-12 18:53:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:58.145214425 +0000 UTC m=+1.393688976" watchObservedRunningTime="2024-04-12 18:53:58.178758712 +0000 UTC m=+1.427233250" Apr 12 18:53:58.201445 kubelet[2657]: I0412 18:53:58.201411 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-22-226" podStartSLOduration=4.201279301 podStartE2EDuration="4.201279301s" podCreationTimestamp="2024-04-12 18:53:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:58.180472415 +0000 UTC m=+1.428946961" watchObservedRunningTime="2024-04-12 18:53:58.201279301 +0000 UTC m=+1.449753846" Apr 12 18:54:01.902839 sudo[1908]: pam_unix(sudo:session): session closed for user root Apr 12 18:54:01.902000 audit[1908]: USER_END pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:54:01.911443 kernel: kauditd_printk_skb: 266 callbacks suppressed Apr 12 18:54:01.911726 kernel: audit: type=1106 audit(1712948041.902:990): pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:54:01.902000 audit[1908]: CRED_DISP pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:54:01.940913 kernel: audit: type=1104 audit(1712948041.902:991): pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:54:01.952428 sshd[1905]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:01.953000 audit[1905]: USER_END pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:01.956081 systemd[1]: sshd@6-172.31.22.226:22-147.75.109.163:53788.service: Deactivated successfully. Apr 12 18:54:01.957547 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:54:01.957735 systemd[1]: session-7.scope: Consumed 3.979s CPU time. Apr 12 18:54:01.960320 systemd-logind[1633]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:54:01.962419 systemd-logind[1633]: Removed session 7. Apr 12 18:54:01.953000 audit[1905]: CRED_DISP pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:01.971015 kernel: audit: type=1106 audit(1712948041.953:992): pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:01.971094 kernel: audit: type=1104 audit(1712948041.953:993): pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:01.971138 kernel: audit: type=1131 audit(1712948041.954:994): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.226:22-147.75.109.163:53788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:01.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.226:22-147.75.109.163:53788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:06.731479 update_engine[1634]: I0412 18:54:06.731433 1634 update_attempter.cc:509] Updating boot flags... Apr 12 18:54:07.099065 kernel: audit: type=1400 audit(1712948047.080:995): avc: denied { watch } for pid=2547 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:54:07.080000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:54:07.080000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fae680 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:07.112383 kernel: audit: type=1300 audit(1712948047.080:995): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fae680 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:07.133936 kernel: audit: type=1327 audit(1712948047.080:995): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:07.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:07.312891 kernel: audit: type=1400 audit(1712948047.301:996): avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:07.301000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:07.328201 kernel: audit: type=1300 audit(1712948047.301:996): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c09bc0 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:07.301000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c09bc0 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:07.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:07.344762 kernel: audit: type=1327 audit(1712948047.301:996): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:07.305000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:07.353471 kernel: audit: type=1400 audit(1712948047.305:997): avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:07.305000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c518a0 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:07.374565 kernel: audit: type=1300 audit(1712948047.305:997): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c518a0 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:07.305000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:07.307000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:07.390213 kernel: audit: type=1327 audit(1712948047.305:997): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:07.390345 kernel: audit: type=1400 audit(1712948047.307:998): avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:07.307000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c51a60 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:07.307000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:07.312000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:07.312000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d08780 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:07.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:10.591955 kubelet[2657]: I0412 18:54:10.591929 2657 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:54:10.592867 env[1648]: time="2024-04-12T18:54:10.592822084Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:54:10.593296 kubelet[2657]: I0412 18:54:10.593272 2657 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:54:11.477407 kubelet[2657]: I0412 18:54:11.477332 2657 topology_manager.go:215] "Topology Admit Handler" podUID="b80592fe-febe-419f-9f7c-94ab18ab98d3" podNamespace="kube-system" podName="kube-proxy-wdxlg" Apr 12 18:54:11.487599 systemd[1]: Created slice kubepods-besteffort-podb80592fe_febe_419f_9f7c_94ab18ab98d3.slice. Apr 12 18:54:11.490963 kubelet[2657]: I0412 18:54:11.490936 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b80592fe-febe-419f-9f7c-94ab18ab98d3-kube-proxy\") pod \"kube-proxy-wdxlg\" (UID: \"b80592fe-febe-419f-9f7c-94ab18ab98d3\") " pod="kube-system/kube-proxy-wdxlg" Apr 12 18:54:11.491108 kubelet[2657]: I0412 18:54:11.491030 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9h5x8\" (UniqueName: \"kubernetes.io/projected/b80592fe-febe-419f-9f7c-94ab18ab98d3-kube-api-access-9h5x8\") pod \"kube-proxy-wdxlg\" (UID: \"b80592fe-febe-419f-9f7c-94ab18ab98d3\") " pod="kube-system/kube-proxy-wdxlg" Apr 12 18:54:11.491108 kubelet[2657]: I0412 18:54:11.491090 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b80592fe-febe-419f-9f7c-94ab18ab98d3-xtables-lock\") pod \"kube-proxy-wdxlg\" (UID: \"b80592fe-febe-419f-9f7c-94ab18ab98d3\") " pod="kube-system/kube-proxy-wdxlg" Apr 12 18:54:11.491205 kubelet[2657]: I0412 18:54:11.491158 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b80592fe-febe-419f-9f7c-94ab18ab98d3-lib-modules\") pod \"kube-proxy-wdxlg\" (UID: \"b80592fe-febe-419f-9f7c-94ab18ab98d3\") " pod="kube-system/kube-proxy-wdxlg" Apr 12 18:54:11.786436 kubelet[2657]: I0412 18:54:11.786320 2657 topology_manager.go:215] "Topology Admit Handler" podUID="414e1c1b-0a39-46aa-9505-a0f645dc86b3" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-dkzcx" Apr 12 18:54:11.794620 systemd[1]: Created slice kubepods-besteffort-pod414e1c1b_0a39_46aa_9505_a0f645dc86b3.slice. Apr 12 18:54:11.797379 env[1648]: time="2024-04-12T18:54:11.796937737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wdxlg,Uid:b80592fe-febe-419f-9f7c-94ab18ab98d3,Namespace:kube-system,Attempt:0,}" Apr 12 18:54:11.831306 env[1648]: time="2024-04-12T18:54:11.831231265Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:11.831515 env[1648]: time="2024-04-12T18:54:11.831276356Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:11.831515 env[1648]: time="2024-04-12T18:54:11.831313146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:11.831670 env[1648]: time="2024-04-12T18:54:11.831591899Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a79db1db949a09544d055c2ef758ab1b2f630efb7a5e128c3904258e74ea2523 pid=3003 runtime=io.containerd.runc.v2 Apr 12 18:54:11.856851 systemd[1]: Started cri-containerd-a79db1db949a09544d055c2ef758ab1b2f630efb7a5e128c3904258e74ea2523.scope. Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.874000 audit: BPF prog-id=121 op=LOAD Apr 12 18:54:11.875000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.875000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3003 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396462316462393439613039353434643035356332656637353861 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3003 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396462316462393439613039353434643035356332656637353861 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit: BPF prog-id=122 op=LOAD Apr 12 18:54:11.876000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002245a0 items=0 ppid=3003 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396462316462393439613039353434643035356332656637353861 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.876000 audit: BPF prog-id=123 op=LOAD Apr 12 18:54:11.876000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002245e8 items=0 ppid=3003 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396462316462393439613039353434643035356332656637353861 Apr 12 18:54:11.877000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:54:11.877000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.877000 audit: BPF prog-id=124 op=LOAD Apr 12 18:54:11.877000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002249f8 items=0 ppid=3003 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396462316462393439613039353434643035356332656637353861 Apr 12 18:54:11.893045 kubelet[2657]: I0412 18:54:11.892891 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dspwl\" (UniqueName: \"kubernetes.io/projected/414e1c1b-0a39-46aa-9505-a0f645dc86b3-kube-api-access-dspwl\") pod \"tigera-operator-6bfc79cb9c-dkzcx\" (UID: \"414e1c1b-0a39-46aa-9505-a0f645dc86b3\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-dkzcx" Apr 12 18:54:11.893045 kubelet[2657]: I0412 18:54:11.892965 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/414e1c1b-0a39-46aa-9505-a0f645dc86b3-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-dkzcx\" (UID: \"414e1c1b-0a39-46aa-9505-a0f645dc86b3\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-dkzcx" Apr 12 18:54:11.896760 env[1648]: time="2024-04-12T18:54:11.896718074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wdxlg,Uid:b80592fe-febe-419f-9f7c-94ab18ab98d3,Namespace:kube-system,Attempt:0,} returns sandbox id \"a79db1db949a09544d055c2ef758ab1b2f630efb7a5e128c3904258e74ea2523\"" Apr 12 18:54:11.914106 env[1648]: time="2024-04-12T18:54:11.914019708Z" level=info msg="CreateContainer within sandbox \"a79db1db949a09544d055c2ef758ab1b2f630efb7a5e128c3904258e74ea2523\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:54:11.945657 env[1648]: time="2024-04-12T18:54:11.945619221Z" level=info msg="CreateContainer within sandbox \"a79db1db949a09544d055c2ef758ab1b2f630efb7a5e128c3904258e74ea2523\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d2c389e8ea6c9f2beb99a8524f9e0df7eda1ff60c672f3916cf7f367c96ba966\"" Apr 12 18:54:11.946572 env[1648]: time="2024-04-12T18:54:11.946541477Z" level=info msg="StartContainer for \"d2c389e8ea6c9f2beb99a8524f9e0df7eda1ff60c672f3916cf7f367c96ba966\"" Apr 12 18:54:11.965522 systemd[1]: Started cri-containerd-d2c389e8ea6c9f2beb99a8524f9e0df7eda1ff60c672f3916cf7f367c96ba966.scope. Apr 12 18:54:11.982000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.982000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6119f484d8 items=0 ppid=3003 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633338396538656136633966326265623939613835323466396530 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit: BPF prog-id=125 op=LOAD Apr 12 18:54:11.983000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000234948 items=0 ppid=3003 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633338396538656136633966326265623939613835323466396530 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.983000 audit: BPF prog-id=126 op=LOAD Apr 12 18:54:11.983000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000234998 items=0 ppid=3003 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633338396538656136633966326265623939613835323466396530 Apr 12 18:54:11.984000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:54:11.984000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:11.984000 audit: BPF prog-id=127 op=LOAD Apr 12 18:54:11.984000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000234a28 items=0 ppid=3003 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:11.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633338396538656136633966326265623939613835323466396530 Apr 12 18:54:12.011787 env[1648]: time="2024-04-12T18:54:12.011746619Z" level=info msg="StartContainer for \"d2c389e8ea6c9f2beb99a8524f9e0df7eda1ff60c672f3916cf7f367c96ba966\" returns successfully" Apr 12 18:54:12.099502 env[1648]: time="2024-04-12T18:54:12.099398190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-dkzcx,Uid:414e1c1b-0a39-46aa-9505-a0f645dc86b3,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:54:12.134905 env[1648]: time="2024-04-12T18:54:12.134773391Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:12.135110 env[1648]: time="2024-04-12T18:54:12.134864183Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:12.135110 env[1648]: time="2024-04-12T18:54:12.134881710Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:12.138008 env[1648]: time="2024-04-12T18:54:12.135254028Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a103e51cd77feda418260a710e53c67123e68616826a64703103bfcd0e145b22 pid=3079 runtime=io.containerd.runc.v2 Apr 12 18:54:12.153864 systemd[1]: Started cri-containerd-a103e51cd77feda418260a710e53c67123e68616826a64703103bfcd0e145b22.scope. Apr 12 18:54:12.180032 kernel: kauditd_printk_skb: 105 callbacks suppressed Apr 12 18:54:12.180167 kernel: audit: type=1400 audit(1712948052.177:1024): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204441 kernel: audit: type=1400 audit(1712948052.177:1025): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.225009 kernel: audit: type=1400 audit(1712948052.177:1026): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.225168 kernel: audit: type=1400 audit(1712948052.177:1027): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.225208 kernel: audit: type=1400 audit(1712948052.177:1028): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.235789 kernel: audit: type=1400 audit(1712948052.177:1029): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.235936 kernel: audit: type=1400 audit(1712948052.177:1030): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.262401 kernel: audit: type=1400 audit(1712948052.177:1031): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.262547 kernel: audit: type=1400 audit(1712948052.177:1032): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.274467 kernel: audit: type=1400 audit(1712948052.178:1033): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.178000 audit: BPF prog-id=128 op=LOAD Apr 12 18:54:12.203000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.203000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3079 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303365353163643737666564613431383236306137313065353363 Apr 12 18:54:12.203000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.203000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3079 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303365353163643737666564613431383236306137313065353363 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.204000 audit: BPF prog-id=129 op=LOAD Apr 12 18:54:12.204000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a1100 items=0 ppid=3079 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303365353163643737666564613431383236306137313065353363 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.229000 audit: BPF prog-id=130 op=LOAD Apr 12 18:54:12.229000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1148 items=0 ppid=3079 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303365353163643737666564613431383236306137313065353363 Apr 12 18:54:12.243000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:54:12.243000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:12.243000 audit: BPF prog-id=131 op=LOAD Apr 12 18:54:12.243000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1558 items=0 ppid=3079 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303365353163643737666564613431383236306137313065353363 Apr 12 18:54:12.312873 env[1648]: time="2024-04-12T18:54:12.312819874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-dkzcx,Uid:414e1c1b-0a39-46aa-9505-a0f645dc86b3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a103e51cd77feda418260a710e53c67123e68616826a64703103bfcd0e145b22\"" Apr 12 18:54:12.314917 env[1648]: time="2024-04-12T18:54:12.314886995Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:54:12.513000 audit[3137]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=3137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.513000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce5a094d0 a2=0 a3=7ffce5a094bc items=0 ppid=3054 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:54:12.515000 audit[3138]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.515000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbe29a630 a2=0 a3=7ffcbe29a61c items=0 ppid=3054 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:54:12.517000 audit[3139]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=3139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.517000 audit[3139]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7c16bf00 a2=0 a3=7ffc7c16beec items=0 ppid=3054 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:54:12.519000 audit[3140]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.519000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca746cef0 a2=0 a3=7ffca746cedc items=0 ppid=3054 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:54:12.522000 audit[3141]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.522000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff25ca0900 a2=0 a3=7fff25ca08ec items=0 ppid=3054 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:54:12.524000 audit[3142]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.524000 audit[3142]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc50be7e0 a2=0 a3=7ffcc50be7cc items=0 ppid=3054 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:54:12.620216 systemd[1]: run-containerd-runc-k8s.io-a79db1db949a09544d055c2ef758ab1b2f630efb7a5e128c3904258e74ea2523-runc.71MvCJ.mount: Deactivated successfully. Apr 12 18:54:12.629000 audit[3143]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.629000 audit[3143]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe06532c20 a2=0 a3=7ffe06532c0c items=0 ppid=3054 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:54:12.640000 audit[3145]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.640000 audit[3145]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffecf082be0 a2=0 a3=7ffecf082bcc items=0 ppid=3054 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:54:12.651000 audit[3148]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.651000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc5dc6ffd0 a2=0 a3=7ffc5dc6ffbc items=0 ppid=3054 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.651000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:54:12.654000 audit[3149]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.654000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd27a8470 a2=0 a3=7ffdd27a845c items=0 ppid=3054 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:54:12.660000 audit[3151]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.660000 audit[3151]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1c798540 a2=0 a3=7ffd1c79852c items=0 ppid=3054 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:54:12.665000 audit[3152]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.665000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe54414410 a2=0 a3=7ffe544143fc items=0 ppid=3054 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:54:12.678000 audit[3154]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.678000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd56df790 a2=0 a3=7ffdd56df77c items=0 ppid=3054 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:54:12.689000 audit[3157]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.689000 audit[3157]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc14ccb20 a2=0 a3=7fffc14ccb0c items=0 ppid=3054 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:54:12.691000 audit[3158]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.691000 audit[3158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe02a1e930 a2=0 a3=7ffe02a1e91c items=0 ppid=3054 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:54:12.698000 audit[3160]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.698000 audit[3160]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe950ca580 a2=0 a3=7ffe950ca56c items=0 ppid=3054 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:54:12.703000 audit[3161]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.703000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3807cfa0 a2=0 a3=7fff3807cf8c items=0 ppid=3054 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:54:12.717000 audit[3163]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.717000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6a4ce2f0 a2=0 a3=7fff6a4ce2dc items=0 ppid=3054 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:54:12.726000 audit[3166]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.726000 audit[3166]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0abe1240 a2=0 a3=7ffe0abe122c items=0 ppid=3054 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:54:12.735000 audit[3169]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.735000 audit[3169]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2174be40 a2=0 a3=7ffd2174be2c items=0 ppid=3054 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:54:12.738000 audit[3170]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.738000 audit[3170]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe695689b0 a2=0 a3=7ffe6956899c items=0 ppid=3054 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:54:12.742000 audit[3172]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.742000 audit[3172]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc81beea50 a2=0 a3=7ffc81beea3c items=0 ppid=3054 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:54:12.746000 audit[3175]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.746000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe32befa0 a2=0 a3=7fffe32bef8c items=0 ppid=3054 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:54:12.748000 audit[3176]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.748000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe49842b70 a2=0 a3=7ffe49842b5c items=0 ppid=3054 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:54:12.751000 audit[3178]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:54:12.751000 audit[3178]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe61d31720 a2=0 a3=7ffe61d3170c items=0 ppid=3054 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:54:12.780000 audit[3184]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:12.780000 audit[3184]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff2517a1b0 a2=0 a3=7fff2517a19c items=0 ppid=3054 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:12.789000 audit[3184]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:12.789000 audit[3184]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff2517a1b0 a2=0 a3=7fff2517a19c items=0 ppid=3054 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:12.801000 audit[3189]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.801000 audit[3189]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd7fcf7680 a2=0 a3=7ffd7fcf766c items=0 ppid=3054 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:54:12.814000 audit[3191]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.814000 audit[3191]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed0a2e980 a2=0 a3=7ffed0a2e96c items=0 ppid=3054 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:54:12.818000 audit[3194]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.818000 audit[3194]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff79247520 a2=0 a3=7fff7924750c items=0 ppid=3054 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:54:12.820000 audit[3195]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.820000 audit[3195]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff72ce2390 a2=0 a3=7fff72ce237c items=0 ppid=3054 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:54:12.823000 audit[3197]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.823000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffab71dbc0 a2=0 a3=7fffab71dbac items=0 ppid=3054 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:54:12.824000 audit[3198]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.824000 audit[3198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9f025e30 a2=0 a3=7fff9f025e1c items=0 ppid=3054 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:54:12.827000 audit[3200]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.827000 audit[3200]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd51f5e760 a2=0 a3=7ffd51f5e74c items=0 ppid=3054 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:54:12.831000 audit[3203]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.831000 audit[3203]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff65a61f70 a2=0 a3=7fff65a61f5c items=0 ppid=3054 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:54:12.832000 audit[3204]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.832000 audit[3204]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed43022f0 a2=0 a3=7ffed43022dc items=0 ppid=3054 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:54:12.835000 audit[3206]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.835000 audit[3206]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedaacbf80 a2=0 a3=7ffedaacbf6c items=0 ppid=3054 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:54:12.837000 audit[3207]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.837000 audit[3207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1dfa4be0 a2=0 a3=7fff1dfa4bcc items=0 ppid=3054 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:54:12.840000 audit[3209]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.840000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdaaee0350 a2=0 a3=7ffdaaee033c items=0 ppid=3054 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:54:12.844000 audit[3212]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.844000 audit[3212]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc20beba0 a2=0 a3=7fffc20beb8c items=0 ppid=3054 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:54:12.848000 audit[3215]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.848000 audit[3215]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5c7b11a0 a2=0 a3=7ffe5c7b118c items=0 ppid=3054 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:54:12.849000 audit[3216]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.849000 audit[3216]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd8b0ab0f0 a2=0 a3=7ffd8b0ab0dc items=0 ppid=3054 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:54:12.852000 audit[3218]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.852000 audit[3218]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd8eb573d0 a2=0 a3=7ffd8eb573bc items=0 ppid=3054 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:54:12.856000 audit[3221]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.856000 audit[3221]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff85f5fff0 a2=0 a3=7fff85f5ffdc items=0 ppid=3054 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:54:12.857000 audit[3222]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.857000 audit[3222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcb730940 a2=0 a3=7fffcb73092c items=0 ppid=3054 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:54:12.860000 audit[3224]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.860000 audit[3224]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdfc1895c0 a2=0 a3=7ffdfc1895ac items=0 ppid=3054 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:54:12.862000 audit[3225]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.862000 audit[3225]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd84783d70 a2=0 a3=7ffd84783d5c items=0 ppid=3054 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:54:12.865000 audit[3227]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.865000 audit[3227]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8af57940 a2=0 a3=7ffc8af5792c items=0 ppid=3054 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:54:12.869000 audit[3230]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:54:12.869000 audit[3230]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8ecef450 a2=0 a3=7ffc8ecef43c items=0 ppid=3054 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:54:12.873000 audit[3232]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:54:12.873000 audit[3232]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fffb6222b60 a2=0 a3=7fffb6222b4c items=0 ppid=3054 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.873000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:12.874000 audit[3232]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:54:12.874000 audit[3232]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffb6222b60 a2=0 a3=7fffb6222b4c items=0 ppid=3054 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:12.874000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:13.025223 kubelet[2657]: I0412 18:54:13.025189 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wdxlg" podStartSLOduration=2.025143887 podStartE2EDuration="2.025143887s" podCreationTimestamp="2024-04-12 18:54:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:54:13.024946815 +0000 UTC m=+16.273421360" watchObservedRunningTime="2024-04-12 18:54:13.025143887 +0000 UTC m=+16.273618430" Apr 12 18:54:14.659802 env[1648]: time="2024-04-12T18:54:14.659751429Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:14.662824 env[1648]: time="2024-04-12T18:54:14.662781863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:14.665205 env[1648]: time="2024-04-12T18:54:14.665171347Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:14.667287 env[1648]: time="2024-04-12T18:54:14.667254904Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:14.667958 env[1648]: time="2024-04-12T18:54:14.667917598Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 18:54:14.672063 env[1648]: time="2024-04-12T18:54:14.672027909Z" level=info msg="CreateContainer within sandbox \"a103e51cd77feda418260a710e53c67123e68616826a64703103bfcd0e145b22\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:54:14.691065 env[1648]: time="2024-04-12T18:54:14.691015255Z" level=info msg="CreateContainer within sandbox \"a103e51cd77feda418260a710e53c67123e68616826a64703103bfcd0e145b22\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d\"" Apr 12 18:54:14.693215 env[1648]: time="2024-04-12T18:54:14.691813598Z" level=info msg="StartContainer for \"e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d\"" Apr 12 18:54:14.722602 systemd[1]: run-containerd-runc-k8s.io-e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d-runc.DPgLbt.mount: Deactivated successfully. Apr 12 18:54:14.724435 systemd[1]: Started cri-containerd-e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d.scope. Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit: BPF prog-id=132 op=LOAD Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3079 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376636366239353531333334663366396363623938653464353033 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3079 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376636366239353531333334663366396363623938653464353033 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.743000 audit: BPF prog-id=133 op=LOAD Apr 12 18:54:14.743000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4e10 items=0 ppid=3079 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376636366239353531333334663366396363623938653464353033 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit: BPF prog-id=134 op=LOAD Apr 12 18:54:14.744000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4e58 items=0 ppid=3079 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376636366239353531333334663366396363623938653464353033 Apr 12 18:54:14.744000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:54:14.744000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.744000 audit: BPF prog-id=135 op=LOAD Apr 12 18:54:14.744000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d5268 items=0 ppid=3079 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376636366239353531333334663366396363623938653464353033 Apr 12 18:54:14.764618 env[1648]: time="2024-04-12T18:54:14.764570951Z" level=info msg="StartContainer for \"e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d\" returns successfully" Apr 12 18:54:16.514000 audit[3277]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=3277 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:16.514000 audit[3277]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc68d33d10 a2=0 a3=7ffc68d33cfc items=0 ppid=3054 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:16.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:16.515000 audit[3277]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3277 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:16.515000 audit[3277]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc68d33d10 a2=0 a3=0 items=0 ppid=3054 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:16.515000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:16.521000 audit[3279]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=3279 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:16.521000 audit[3279]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe754e8f30 a2=0 a3=7ffe754e8f1c items=0 ppid=3054 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:16.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:16.522000 audit[3279]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3279 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:16.522000 audit[3279]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe754e8f30 a2=0 a3=0 items=0 ppid=3054 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:16.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:16.664564 kubelet[2657]: I0412 18:54:16.664512 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-dkzcx" podStartSLOduration=3.310482758 podStartE2EDuration="5.664458269s" podCreationTimestamp="2024-04-12 18:54:11 +0000 UTC" firstStartedPulling="2024-04-12 18:54:12.314350105 +0000 UTC m=+15.562824640" lastFinishedPulling="2024-04-12 18:54:14.66832563 +0000 UTC m=+17.916800151" observedRunningTime="2024-04-12 18:54:15.030607752 +0000 UTC m=+18.279082296" watchObservedRunningTime="2024-04-12 18:54:16.664458269 +0000 UTC m=+19.912932805" Apr 12 18:54:16.665077 kubelet[2657]: I0412 18:54:16.664725 2657 topology_manager.go:215] "Topology Admit Handler" podUID="b008c64d-a906-4d9c-8c4b-f0e3ebd0e546" podNamespace="calico-system" podName="calico-typha-87d64c755-bx77g" Apr 12 18:54:16.671712 systemd[1]: Created slice kubepods-besteffort-podb008c64d_a906_4d9c_8c4b_f0e3ebd0e546.slice. Apr 12 18:54:16.729438 kubelet[2657]: I0412 18:54:16.729388 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b008c64d-a906-4d9c-8c4b-f0e3ebd0e546-tigera-ca-bundle\") pod \"calico-typha-87d64c755-bx77g\" (UID: \"b008c64d-a906-4d9c-8c4b-f0e3ebd0e546\") " pod="calico-system/calico-typha-87d64c755-bx77g" Apr 12 18:54:16.729728 kubelet[2657]: I0412 18:54:16.729711 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b008c64d-a906-4d9c-8c4b-f0e3ebd0e546-typha-certs\") pod \"calico-typha-87d64c755-bx77g\" (UID: \"b008c64d-a906-4d9c-8c4b-f0e3ebd0e546\") " pod="calico-system/calico-typha-87d64c755-bx77g" Apr 12 18:54:16.729860 kubelet[2657]: I0412 18:54:16.729847 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gwb6w\" (UniqueName: \"kubernetes.io/projected/b008c64d-a906-4d9c-8c4b-f0e3ebd0e546-kube-api-access-gwb6w\") pod \"calico-typha-87d64c755-bx77g\" (UID: \"b008c64d-a906-4d9c-8c4b-f0e3ebd0e546\") " pod="calico-system/calico-typha-87d64c755-bx77g" Apr 12 18:54:16.781839 kubelet[2657]: I0412 18:54:16.781733 2657 topology_manager.go:215] "Topology Admit Handler" podUID="68eb9be5-cd20-492f-b53e-4f6d91ca202c" podNamespace="calico-system" podName="calico-node-wkhnh" Apr 12 18:54:16.789341 systemd[1]: Created slice kubepods-besteffort-pod68eb9be5_cd20_492f_b53e_4f6d91ca202c.slice. Apr 12 18:54:16.831025 kubelet[2657]: I0412 18:54:16.830984 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-cni-log-dir\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831211 kubelet[2657]: I0412 18:54:16.831056 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-lib-modules\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831211 kubelet[2657]: I0412 18:54:16.831117 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-cni-bin-dir\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831211 kubelet[2657]: I0412 18:54:16.831151 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-cni-net-dir\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831211 kubelet[2657]: I0412 18:54:16.831192 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/68eb9be5-cd20-492f-b53e-4f6d91ca202c-node-certs\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831415 kubelet[2657]: I0412 18:54:16.831219 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-var-run-calico\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831415 kubelet[2657]: I0412 18:54:16.831264 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/68eb9be5-cd20-492f-b53e-4f6d91ca202c-tigera-ca-bundle\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831415 kubelet[2657]: I0412 18:54:16.831294 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-var-lib-calico\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831415 kubelet[2657]: I0412 18:54:16.831359 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-xtables-lock\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831415 kubelet[2657]: I0412 18:54:16.831409 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-policysync\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831619 kubelet[2657]: I0412 18:54:16.831440 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tzlzf\" (UniqueName: \"kubernetes.io/projected/68eb9be5-cd20-492f-b53e-4f6d91ca202c-kube-api-access-tzlzf\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.831619 kubelet[2657]: I0412 18:54:16.831488 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/68eb9be5-cd20-492f-b53e-4f6d91ca202c-flexvol-driver-host\") pod \"calico-node-wkhnh\" (UID: \"68eb9be5-cd20-492f-b53e-4f6d91ca202c\") " pod="calico-system/calico-node-wkhnh" Apr 12 18:54:16.934043 kubelet[2657]: E0412 18:54:16.933999 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:16.934043 kubelet[2657]: W0412 18:54:16.934039 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:16.934242 kubelet[2657]: E0412 18:54:16.934064 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:16.943717 kubelet[2657]: E0412 18:54:16.943689 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:16.943717 kubelet[2657]: W0412 18:54:16.943712 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:16.943987 kubelet[2657]: E0412 18:54:16.943736 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:16.961073 kubelet[2657]: I0412 18:54:16.961046 2657 topology_manager.go:215] "Topology Admit Handler" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" podNamespace="calico-system" podName="csi-node-driver-nzrsx" Apr 12 18:54:16.961569 kubelet[2657]: E0412 18:54:16.961547 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nzrsx" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" Apr 12 18:54:16.962806 kubelet[2657]: E0412 18:54:16.962789 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:16.962927 kubelet[2657]: W0412 18:54:16.962913 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:16.963009 kubelet[2657]: E0412 18:54:16.962997 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:16.976468 env[1648]: time="2024-04-12T18:54:16.976420621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-87d64c755-bx77g,Uid:b008c64d-a906-4d9c-8c4b-f0e3ebd0e546,Namespace:calico-system,Attempt:0,}" Apr 12 18:54:17.005122 env[1648]: time="2024-04-12T18:54:17.004887256Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:17.009692 env[1648]: time="2024-04-12T18:54:17.009631045Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:17.009904 env[1648]: time="2024-04-12T18:54:17.009875342Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:17.010253 env[1648]: time="2024-04-12T18:54:17.010208037Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad3f6bd3c0f1c3ec9816299166320d1d0c6298e6f4f5dfc2326aad5132e4e831 pid=3293 runtime=io.containerd.runc.v2 Apr 12 18:54:17.030390 kubelet[2657]: E0412 18:54:17.030089 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.030390 kubelet[2657]: W0412 18:54:17.030110 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.030390 kubelet[2657]: E0412 18:54:17.030136 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.030813 kubelet[2657]: E0412 18:54:17.030690 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.030813 kubelet[2657]: W0412 18:54:17.030704 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.030813 kubelet[2657]: E0412 18:54:17.030722 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.031147 kubelet[2657]: E0412 18:54:17.031024 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.031147 kubelet[2657]: W0412 18:54:17.031037 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.031147 kubelet[2657]: E0412 18:54:17.031053 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.031375 kubelet[2657]: E0412 18:54:17.031350 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.031467 kubelet[2657]: W0412 18:54:17.031454 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.031637 kubelet[2657]: E0412 18:54:17.031530 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.031755 kubelet[2657]: E0412 18:54:17.031745 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.031821 kubelet[2657]: W0412 18:54:17.031811 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.033494 kubelet[2657]: E0412 18:54:17.031902 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.034349 kubelet[2657]: E0412 18:54:17.034335 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.034571 kubelet[2657]: W0412 18:54:17.034557 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.034648 kubelet[2657]: E0412 18:54:17.034639 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.037512 kubelet[2657]: E0412 18:54:17.037496 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.037608 kubelet[2657]: W0412 18:54:17.037595 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.037696 kubelet[2657]: E0412 18:54:17.037687 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.038211 kubelet[2657]: E0412 18:54:17.038199 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.038301 kubelet[2657]: W0412 18:54:17.038290 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.038415 kubelet[2657]: E0412 18:54:17.038405 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.038721 kubelet[2657]: E0412 18:54:17.038709 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.038816 kubelet[2657]: W0412 18:54:17.038805 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.038885 kubelet[2657]: E0412 18:54:17.038878 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.039111 kubelet[2657]: E0412 18:54:17.039101 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.039192 kubelet[2657]: W0412 18:54:17.039182 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.039254 kubelet[2657]: E0412 18:54:17.039246 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.039521 kubelet[2657]: E0412 18:54:17.039510 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.039616 kubelet[2657]: W0412 18:54:17.039604 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.039696 kubelet[2657]: E0412 18:54:17.039686 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.039962 kubelet[2657]: E0412 18:54:17.039951 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.040091 kubelet[2657]: W0412 18:54:17.040076 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.040185 kubelet[2657]: E0412 18:54:17.040175 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.040512 kubelet[2657]: E0412 18:54:17.040499 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.040600 kubelet[2657]: W0412 18:54:17.040588 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.040674 kubelet[2657]: E0412 18:54:17.040665 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.043084 kubelet[2657]: E0412 18:54:17.043070 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.043192 kubelet[2657]: W0412 18:54:17.043179 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.043297 kubelet[2657]: E0412 18:54:17.043286 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.044242 kubelet[2657]: E0412 18:54:17.044229 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.044353 kubelet[2657]: W0412 18:54:17.044340 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.044477 kubelet[2657]: E0412 18:54:17.044466 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.044754 kubelet[2657]: E0412 18:54:17.044742 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.044857 kubelet[2657]: W0412 18:54:17.044844 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.044935 kubelet[2657]: E0412 18:54:17.044925 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.045229 kubelet[2657]: E0412 18:54:17.045217 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.045326 kubelet[2657]: W0412 18:54:17.045315 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.045450 kubelet[2657]: E0412 18:54:17.045440 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.045741 kubelet[2657]: E0412 18:54:17.045728 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.045837 kubelet[2657]: W0412 18:54:17.045825 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.045911 kubelet[2657]: E0412 18:54:17.045902 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.046157 kubelet[2657]: E0412 18:54:17.046146 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.046243 kubelet[2657]: W0412 18:54:17.046232 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.046324 kubelet[2657]: E0412 18:54:17.046315 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.046901 kubelet[2657]: E0412 18:54:17.046887 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.047008 kubelet[2657]: W0412 18:54:17.046995 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.047092 kubelet[2657]: E0412 18:54:17.047083 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.047504 kubelet[2657]: E0412 18:54:17.047491 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.048117 kubelet[2657]: W0412 18:54:17.048101 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.048226 kubelet[2657]: E0412 18:54:17.048215 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.048331 kubelet[2657]: I0412 18:54:17.048322 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/6bafbd32-21fe-46f8-9db9-21478e19beab-varrun\") pod \"csi-node-driver-nzrsx\" (UID: \"6bafbd32-21fe-46f8-9db9-21478e19beab\") " pod="calico-system/csi-node-driver-nzrsx" Apr 12 18:54:17.048688 kubelet[2657]: E0412 18:54:17.048675 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.048782 kubelet[2657]: W0412 18:54:17.048768 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.048861 kubelet[2657]: E0412 18:54:17.048850 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.049120 kubelet[2657]: E0412 18:54:17.049107 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.049938 kubelet[2657]: W0412 18:54:17.049922 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.050054 kubelet[2657]: E0412 18:54:17.050042 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.050588 kubelet[2657]: I0412 18:54:17.050575 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/6bafbd32-21fe-46f8-9db9-21478e19beab-registration-dir\") pod \"csi-node-driver-nzrsx\" (UID: \"6bafbd32-21fe-46f8-9db9-21478e19beab\") " pod="calico-system/csi-node-driver-nzrsx" Apr 12 18:54:17.050811 kubelet[2657]: E0412 18:54:17.050799 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.051176 kubelet[2657]: W0412 18:54:17.051160 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.051375 kubelet[2657]: E0412 18:54:17.051350 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.051704 kubelet[2657]: E0412 18:54:17.051693 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.051953 kubelet[2657]: W0412 18:54:17.051938 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.052043 kubelet[2657]: E0412 18:54:17.052032 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.052844 kubelet[2657]: E0412 18:54:17.052831 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.052947 kubelet[2657]: W0412 18:54:17.052935 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.053029 kubelet[2657]: E0412 18:54:17.053019 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.053184 kubelet[2657]: I0412 18:54:17.053175 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/6bafbd32-21fe-46f8-9db9-21478e19beab-kubelet-dir\") pod \"csi-node-driver-nzrsx\" (UID: \"6bafbd32-21fe-46f8-9db9-21478e19beab\") " pod="calico-system/csi-node-driver-nzrsx" Apr 12 18:54:17.053429 kubelet[2657]: E0412 18:54:17.053418 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.053523 kubelet[2657]: W0412 18:54:17.053511 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.053600 kubelet[2657]: E0412 18:54:17.053590 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.054006 systemd[1]: Started cri-containerd-ad3f6bd3c0f1c3ec9816299166320d1d0c6298e6f4f5dfc2326aad5132e4e831.scope. Apr 12 18:54:17.057557 kubelet[2657]: E0412 18:54:17.057542 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.057669 kubelet[2657]: W0412 18:54:17.057655 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.057751 kubelet[2657]: E0412 18:54:17.057741 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.058044 kubelet[2657]: E0412 18:54:17.058011 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.058136 kubelet[2657]: W0412 18:54:17.058122 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.058216 kubelet[2657]: E0412 18:54:17.058207 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.061547 kubelet[2657]: E0412 18:54:17.061524 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.061547 kubelet[2657]: W0412 18:54:17.061545 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.061685 kubelet[2657]: E0412 18:54:17.061563 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.061685 kubelet[2657]: I0412 18:54:17.061595 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/6bafbd32-21fe-46f8-9db9-21478e19beab-socket-dir\") pod \"csi-node-driver-nzrsx\" (UID: \"6bafbd32-21fe-46f8-9db9-21478e19beab\") " pod="calico-system/csi-node-driver-nzrsx" Apr 12 18:54:17.061809 kubelet[2657]: E0412 18:54:17.061792 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.061857 kubelet[2657]: W0412 18:54:17.061810 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.061857 kubelet[2657]: E0412 18:54:17.061826 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.061941 kubelet[2657]: I0412 18:54:17.061857 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q8njf\" (UniqueName: \"kubernetes.io/projected/6bafbd32-21fe-46f8-9db9-21478e19beab-kube-api-access-q8njf\") pod \"csi-node-driver-nzrsx\" (UID: \"6bafbd32-21fe-46f8-9db9-21478e19beab\") " pod="calico-system/csi-node-driver-nzrsx" Apr 12 18:54:17.062102 kubelet[2657]: E0412 18:54:17.062084 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.062163 kubelet[2657]: W0412 18:54:17.062102 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.062163 kubelet[2657]: E0412 18:54:17.062117 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.062299 kubelet[2657]: E0412 18:54:17.062286 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.062353 kubelet[2657]: W0412 18:54:17.062300 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.062353 kubelet[2657]: E0412 18:54:17.062317 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.062575 kubelet[2657]: E0412 18:54:17.062559 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.062629 kubelet[2657]: W0412 18:54:17.062574 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.062629 kubelet[2657]: E0412 18:54:17.062589 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.062769 kubelet[2657]: E0412 18:54:17.062755 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.062816 kubelet[2657]: W0412 18:54:17.062770 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.062816 kubelet[2657]: E0412 18:54:17.062786 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.094351 env[1648]: time="2024-04-12T18:54:17.094306523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wkhnh,Uid:68eb9be5-cd20-492f-b53e-4f6d91ca202c,Namespace:calico-system,Attempt:0,}" Apr 12 18:54:17.119041 env[1648]: time="2024-04-12T18:54:17.118965192Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:17.119307 env[1648]: time="2024-04-12T18:54:17.119277232Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:17.120459 env[1648]: time="2024-04-12T18:54:17.120427040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:17.120779 env[1648]: time="2024-04-12T18:54:17.120746338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88 pid=3355 runtime=io.containerd.runc.v2 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.135000 audit: BPF prog-id=136 op=LOAD Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3293 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164336636626433633066316333656339383136323939313636333230 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3293 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164336636626433633066316333656339383136323939313636333230 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit: BPF prog-id=137 op=LOAD Apr 12 18:54:17.136000 audit[3300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001b8fa0 items=0 ppid=3293 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164336636626433633066316333656339383136323939313636333230 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit: BPF prog-id=138 op=LOAD Apr 12 18:54:17.136000 audit[3300]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001b8fe8 items=0 ppid=3293 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164336636626433633066316333656339383136323939313636333230 Apr 12 18:54:17.136000 audit: BPF prog-id=138 op=UNLOAD Apr 12 18:54:17.136000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.136000 audit: BPF prog-id=139 op=LOAD Apr 12 18:54:17.136000 audit[3300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001b93f8 items=0 ppid=3293 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164336636626433633066316333656339383136323939313636333230 Apr 12 18:54:17.156657 systemd[1]: Started cri-containerd-c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88.scope. Apr 12 18:54:17.163671 kubelet[2657]: E0412 18:54:17.162684 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.163671 kubelet[2657]: W0412 18:54:17.162701 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.163671 kubelet[2657]: E0412 18:54:17.162725 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.163671 kubelet[2657]: E0412 18:54:17.162925 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.163671 kubelet[2657]: W0412 18:54:17.162934 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.163671 kubelet[2657]: E0412 18:54:17.162947 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.163671 kubelet[2657]: E0412 18:54:17.163466 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.163671 kubelet[2657]: W0412 18:54:17.163478 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.163671 kubelet[2657]: E0412 18:54:17.163498 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.164186 kubelet[2657]: E0412 18:54:17.163750 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.164186 kubelet[2657]: W0412 18:54:17.163760 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.164186 kubelet[2657]: E0412 18:54:17.163778 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.164186 kubelet[2657]: E0412 18:54:17.164036 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.164186 kubelet[2657]: W0412 18:54:17.164046 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.164186 kubelet[2657]: E0412 18:54:17.164064 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.165721 kubelet[2657]: E0412 18:54:17.164284 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.165721 kubelet[2657]: W0412 18:54:17.164296 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.165721 kubelet[2657]: E0412 18:54:17.164315 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.165721 kubelet[2657]: E0412 18:54:17.164563 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.165721 kubelet[2657]: W0412 18:54:17.164573 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.165721 kubelet[2657]: E0412 18:54:17.164650 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.165721 kubelet[2657]: E0412 18:54:17.164766 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.165721 kubelet[2657]: W0412 18:54:17.164774 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.165721 kubelet[2657]: E0412 18:54:17.164847 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.165721 kubelet[2657]: E0412 18:54:17.164958 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.166180 kubelet[2657]: W0412 18:54:17.164965 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.166180 kubelet[2657]: E0412 18:54:17.165036 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.166180 kubelet[2657]: E0412 18:54:17.165150 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.166180 kubelet[2657]: W0412 18:54:17.165158 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.166180 kubelet[2657]: E0412 18:54:17.165229 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.166180 kubelet[2657]: E0412 18:54:17.165340 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.166180 kubelet[2657]: W0412 18:54:17.165347 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.166180 kubelet[2657]: E0412 18:54:17.165419 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.166180 kubelet[2657]: E0412 18:54:17.165594 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.166180 kubelet[2657]: W0412 18:54:17.165603 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.166720 kubelet[2657]: E0412 18:54:17.165621 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.166720 kubelet[2657]: E0412 18:54:17.165866 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.166720 kubelet[2657]: W0412 18:54:17.165875 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.166720 kubelet[2657]: E0412 18:54:17.165894 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.166720 kubelet[2657]: E0412 18:54:17.166094 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.166720 kubelet[2657]: W0412 18:54:17.166103 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.166720 kubelet[2657]: E0412 18:54:17.166120 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.166720 kubelet[2657]: E0412 18:54:17.166317 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.166720 kubelet[2657]: W0412 18:54:17.166326 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.166720 kubelet[2657]: E0412 18:54:17.166412 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.167116 kubelet[2657]: E0412 18:54:17.166551 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.167116 kubelet[2657]: W0412 18:54:17.166561 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.167375 kubelet[2657]: E0412 18:54:17.167319 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.170397 kubelet[2657]: E0412 18:54:17.169186 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.170397 kubelet[2657]: W0412 18:54:17.169200 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.170397 kubelet[2657]: E0412 18:54:17.169326 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.170397 kubelet[2657]: E0412 18:54:17.169513 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.170397 kubelet[2657]: W0412 18:54:17.169536 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.170397 kubelet[2657]: E0412 18:54:17.169622 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.170397 kubelet[2657]: E0412 18:54:17.169749 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.170397 kubelet[2657]: W0412 18:54:17.169757 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.170397 kubelet[2657]: E0412 18:54:17.169863 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.170397 kubelet[2657]: E0412 18:54:17.170039 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.170852 kubelet[2657]: W0412 18:54:17.170048 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.170852 kubelet[2657]: E0412 18:54:17.170067 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.170852 kubelet[2657]: E0412 18:54:17.170281 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.170852 kubelet[2657]: W0412 18:54:17.170290 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.170852 kubelet[2657]: E0412 18:54:17.170312 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.172339 kubelet[2657]: E0412 18:54:17.171254 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.172339 kubelet[2657]: W0412 18:54:17.171267 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.172339 kubelet[2657]: E0412 18:54:17.171288 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.172339 kubelet[2657]: E0412 18:54:17.171544 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.172339 kubelet[2657]: W0412 18:54:17.171554 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.172339 kubelet[2657]: E0412 18:54:17.171573 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.172339 kubelet[2657]: E0412 18:54:17.171859 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.172339 kubelet[2657]: W0412 18:54:17.171869 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.172339 kubelet[2657]: E0412 18:54:17.171960 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.172339 kubelet[2657]: E0412 18:54:17.172102 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.174308 kubelet[2657]: W0412 18:54:17.172110 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.174308 kubelet[2657]: E0412 18:54:17.172125 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.186306 kubelet[2657]: E0412 18:54:17.186283 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:17.186507 kubelet[2657]: W0412 18:54:17.186492 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:17.186601 kubelet[2657]: E0412 18:54:17.186591 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.223696 kernel: kauditd_printk_skb: 326 callbacks suppressed Apr 12 18:54:17.223810 kernel: audit: type=1400 audit(1712948057.220:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.224545 env[1648]: time="2024-04-12T18:54:17.224502530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-87d64c755-bx77g,Uid:b008c64d-a906-4d9c-8c4b-f0e3ebd0e546,Namespace:calico-system,Attempt:0,} returns sandbox id \"ad3f6bd3c0f1c3ec9816299166320d1d0c6298e6f4f5dfc2326aad5132e4e831\"" Apr 12 18:54:17.226666 env[1648]: time="2024-04-12T18:54:17.226633111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.241190 kernel: audit: type=1400 audit(1712948057.220:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.241292 kernel: audit: type=1400 audit(1712948057.220:1135): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.241344 kernel: audit: type=1400 audit(1712948057.220:1136): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.252246 kernel: audit: type=1400 audit(1712948057.220:1137): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.257782 kernel: audit: type=1400 audit(1712948057.220:1138): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.257875 kernel: audit: type=1400 audit(1712948057.220:1139): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.268723 kernel: audit: type=1400 audit(1712948057.220:1140): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.268825 kernel: audit: type=1400 audit(1712948057.220:1141): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.279282 kernel: audit: type=1400 audit(1712948057.220:1142): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.220000 audit: BPF prog-id=140 op=LOAD Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3355 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393964383531643731383965383564666233653034656131343437 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3355 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393964383531643731383965383564666233653034656131343437 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit: BPF prog-id=141 op=LOAD Apr 12 18:54:17.228000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000322a20 items=0 ppid=3355 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393964383531643731383965383564666233653034656131343437 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit: BPF prog-id=142 op=LOAD Apr 12 18:54:17.228000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000322a68 items=0 ppid=3355 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393964383531643731383965383564666233653034656131343437 Apr 12 18:54:17.228000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:54:17.228000 audit: BPF prog-id=141 op=UNLOAD Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:17.228000 audit: BPF prog-id=143 op=LOAD Apr 12 18:54:17.228000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000322e78 items=0 ppid=3355 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393964383531643731383965383564666233653034656131343437 Apr 12 18:54:17.307729 env[1648]: time="2024-04-12T18:54:17.298825086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wkhnh,Uid:68eb9be5-cd20-492f-b53e-4f6d91ca202c,Namespace:calico-system,Attempt:0,} returns sandbox id \"c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88\"" Apr 12 18:54:17.535000 audit[3430]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:17.535000 audit[3430]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd75d9b070 a2=0 a3=7ffd75d9b05c items=0 ppid=3054 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:17.536000 audit[3430]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:17.536000 audit[3430]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd75d9b070 a2=0 a3=0 items=0 ppid=3054 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:17.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:18.283231 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3056970451.mount: Deactivated successfully. Apr 12 18:54:18.945184 kubelet[2657]: E0412 18:54:18.944596 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nzrsx" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" Apr 12 18:54:19.878019 env[1648]: time="2024-04-12T18:54:19.877957263Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:19.881186 env[1648]: time="2024-04-12T18:54:19.881144216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:19.891446 env[1648]: time="2024-04-12T18:54:19.891402173Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:19.892509 env[1648]: time="2024-04-12T18:54:19.892479574Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:19.894117 env[1648]: time="2024-04-12T18:54:19.894077702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 18:54:19.896535 env[1648]: time="2024-04-12T18:54:19.896505331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:54:19.913658 env[1648]: time="2024-04-12T18:54:19.913610908Z" level=info msg="CreateContainer within sandbox \"ad3f6bd3c0f1c3ec9816299166320d1d0c6298e6f4f5dfc2326aad5132e4e831\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:54:19.940218 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1966550789.mount: Deactivated successfully. Apr 12 18:54:19.973062 env[1648]: time="2024-04-12T18:54:19.973013585Z" level=info msg="CreateContainer within sandbox \"ad3f6bd3c0f1c3ec9816299166320d1d0c6298e6f4f5dfc2326aad5132e4e831\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"85d6b7ae5d84331b6a03771c5766ebb324364a35716b8b8cd5fe2f0bfcc415c0\"" Apr 12 18:54:19.973963 env[1648]: time="2024-04-12T18:54:19.973932225Z" level=info msg="StartContainer for \"85d6b7ae5d84331b6a03771c5766ebb324364a35716b8b8cd5fe2f0bfcc415c0\"" Apr 12 18:54:20.008348 systemd[1]: Started cri-containerd-85d6b7ae5d84331b6a03771c5766ebb324364a35716b8b8cd5fe2f0bfcc415c0.scope. Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.038000 audit: BPF prog-id=144 op=LOAD Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3293 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643662376165356438343333316236613033373731633537363665 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3293 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643662376165356438343333316236613033373731633537363665 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit: BPF prog-id=145 op=LOAD Apr 12 18:54:20.039000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030e870 items=0 ppid=3293 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643662376165356438343333316236613033373731633537363665 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit: BPF prog-id=146 op=LOAD Apr 12 18:54:20.039000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030e8b8 items=0 ppid=3293 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643662376165356438343333316236613033373731633537363665 Apr 12 18:54:20.039000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:54:20.039000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:20.039000 audit: BPF prog-id=147 op=LOAD Apr 12 18:54:20.039000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030ecc8 items=0 ppid=3293 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643662376165356438343333316236613033373731633537363665 Apr 12 18:54:20.082558 env[1648]: time="2024-04-12T18:54:20.082513641Z" level=info msg="StartContainer for \"85d6b7ae5d84331b6a03771c5766ebb324364a35716b8b8cd5fe2f0bfcc415c0\" returns successfully" Apr 12 18:54:20.945101 kubelet[2657]: E0412 18:54:20.944968 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nzrsx" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" Apr 12 18:54:21.076654 kubelet[2657]: E0412 18:54:21.076261 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.076654 kubelet[2657]: W0412 18:54:21.076288 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.076654 kubelet[2657]: E0412 18:54:21.076313 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.076654 kubelet[2657]: E0412 18:54:21.076530 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.076654 kubelet[2657]: W0412 18:54:21.076541 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.076654 kubelet[2657]: E0412 18:54:21.076557 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.078209 kubelet[2657]: E0412 18:54:21.077090 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.078209 kubelet[2657]: W0412 18:54:21.077103 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.078209 kubelet[2657]: E0412 18:54:21.077121 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.078209 kubelet[2657]: E0412 18:54:21.077327 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.078209 kubelet[2657]: W0412 18:54:21.077338 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.078209 kubelet[2657]: E0412 18:54:21.077353 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.078209 kubelet[2657]: E0412 18:54:21.077562 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.078209 kubelet[2657]: W0412 18:54:21.077570 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.078209 kubelet[2657]: E0412 18:54:21.077583 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.078209 kubelet[2657]: E0412 18:54:21.077761 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.078758 kubelet[2657]: W0412 18:54:21.077769 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.078758 kubelet[2657]: E0412 18:54:21.077784 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.078758 kubelet[2657]: E0412 18:54:21.077967 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.078758 kubelet[2657]: W0412 18:54:21.077976 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.078758 kubelet[2657]: E0412 18:54:21.077992 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.079742 kubelet[2657]: E0412 18:54:21.079106 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.079742 kubelet[2657]: W0412 18:54:21.079118 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.079742 kubelet[2657]: E0412 18:54:21.079135 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.079742 kubelet[2657]: E0412 18:54:21.079344 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.079742 kubelet[2657]: W0412 18:54:21.079354 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.079742 kubelet[2657]: E0412 18:54:21.079387 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.079742 kubelet[2657]: E0412 18:54:21.079579 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.079742 kubelet[2657]: W0412 18:54:21.079588 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.079742 kubelet[2657]: E0412 18:54:21.079602 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.080654 kubelet[2657]: E0412 18:54:21.080254 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.080654 kubelet[2657]: W0412 18:54:21.080266 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.080654 kubelet[2657]: E0412 18:54:21.080282 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.080654 kubelet[2657]: E0412 18:54:21.080515 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.080654 kubelet[2657]: W0412 18:54:21.080524 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.080654 kubelet[2657]: E0412 18:54:21.080539 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.081295 kubelet[2657]: E0412 18:54:21.081116 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.081295 kubelet[2657]: W0412 18:54:21.081130 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.081295 kubelet[2657]: E0412 18:54:21.081146 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.081638 kubelet[2657]: E0412 18:54:21.081535 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.081638 kubelet[2657]: W0412 18:54:21.081548 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.081638 kubelet[2657]: E0412 18:54:21.081563 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.082074 kubelet[2657]: E0412 18:54:21.081993 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.082074 kubelet[2657]: W0412 18:54:21.082005 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.082074 kubelet[2657]: E0412 18:54:21.082021 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.090783 kubelet[2657]: E0412 18:54:21.090087 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.090783 kubelet[2657]: W0412 18:54:21.090105 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.090783 kubelet[2657]: E0412 18:54:21.090127 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.090783 kubelet[2657]: E0412 18:54:21.090393 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.090783 kubelet[2657]: W0412 18:54:21.090404 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.090783 kubelet[2657]: E0412 18:54:21.090427 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.090783 kubelet[2657]: E0412 18:54:21.090632 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.090783 kubelet[2657]: W0412 18:54:21.090643 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.090783 kubelet[2657]: E0412 18:54:21.090660 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.093560 kubelet[2657]: E0412 18:54:21.091007 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.093560 kubelet[2657]: W0412 18:54:21.091017 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.093560 kubelet[2657]: E0412 18:54:21.091038 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.093560 kubelet[2657]: E0412 18:54:21.091263 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.093560 kubelet[2657]: W0412 18:54:21.091272 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.093560 kubelet[2657]: E0412 18:54:21.091290 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.094754 kubelet[2657]: E0412 18:54:21.093834 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.094754 kubelet[2657]: W0412 18:54:21.093849 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.094754 kubelet[2657]: E0412 18:54:21.094721 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.095466 kubelet[2657]: E0412 18:54:21.095453 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.095573 kubelet[2657]: W0412 18:54:21.095560 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.095746 kubelet[2657]: E0412 18:54:21.095731 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.095919 kubelet[2657]: E0412 18:54:21.095904 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.096003 kubelet[2657]: W0412 18:54:21.095990 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.096223 kubelet[2657]: E0412 18:54:21.096205 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.096386 kubelet[2657]: E0412 18:54:21.096376 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.096471 kubelet[2657]: W0412 18:54:21.096460 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.096658 kubelet[2657]: E0412 18:54:21.096647 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.096989 kubelet[2657]: E0412 18:54:21.096976 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.097088 kubelet[2657]: W0412 18:54:21.097076 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.097185 kubelet[2657]: E0412 18:54:21.097176 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.100140 kubelet[2657]: E0412 18:54:21.100125 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.100249 kubelet[2657]: W0412 18:54:21.100236 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.100335 kubelet[2657]: E0412 18:54:21.100326 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.100758 kubelet[2657]: E0412 18:54:21.100744 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.100853 kubelet[2657]: W0412 18:54:21.100840 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.101049 kubelet[2657]: E0412 18:54:21.101030 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.101223 kubelet[2657]: E0412 18:54:21.101162 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.101319 kubelet[2657]: W0412 18:54:21.101306 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.101547 kubelet[2657]: E0412 18:54:21.101533 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.101705 kubelet[2657]: E0412 18:54:21.101695 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.101784 kubelet[2657]: W0412 18:54:21.101773 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.101958 kubelet[2657]: E0412 18:54:21.101945 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.102113 kubelet[2657]: E0412 18:54:21.102104 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.102258 kubelet[2657]: W0412 18:54:21.102245 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.102338 kubelet[2657]: E0412 18:54:21.102328 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.102930 kubelet[2657]: E0412 18:54:21.102917 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.103426 kubelet[2657]: W0412 18:54:21.103409 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.103543 kubelet[2657]: E0412 18:54:21.103533 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.103914 kubelet[2657]: E0412 18:54:21.103901 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.104012 kubelet[2657]: W0412 18:54:21.104000 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.104097 kubelet[2657]: E0412 18:54:21.104088 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.108436 kubelet[2657]: E0412 18:54:21.108422 2657 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:54:21.108548 kubelet[2657]: W0412 18:54:21.108534 2657 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:54:21.108635 kubelet[2657]: E0412 18:54:21.108624 2657 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:54:21.828282 env[1648]: time="2024-04-12T18:54:21.828236041Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:21.831538 env[1648]: time="2024-04-12T18:54:21.831503088Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:21.834427 env[1648]: time="2024-04-12T18:54:21.834398635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:21.838251 env[1648]: time="2024-04-12T18:54:21.838219928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:21.838935 env[1648]: time="2024-04-12T18:54:21.838903231Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:54:21.842275 env[1648]: time="2024-04-12T18:54:21.842237640Z" level=info msg="CreateContainer within sandbox \"c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:54:21.865779 env[1648]: time="2024-04-12T18:54:21.865732473Z" level=info msg="CreateContainer within sandbox \"c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1c49a1752ba7d6011b58830c26b64b0bbe14a997bf81f8ebc126afc47afae2c8\"" Apr 12 18:54:21.866478 env[1648]: time="2024-04-12T18:54:21.866437693Z" level=info msg="StartContainer for \"1c49a1752ba7d6011b58830c26b64b0bbe14a997bf81f8ebc126afc47afae2c8\"" Apr 12 18:54:21.902868 systemd[1]: Started cri-containerd-1c49a1752ba7d6011b58830c26b64b0bbe14a997bf81f8ebc126afc47afae2c8.scope. Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3e824542f8 items=0 ppid=3355 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163343961313735326261376436303131623538383330633236623634 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit: BPF prog-id=148 op=LOAD Apr 12 18:54:21.920000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024e48 items=0 ppid=3355 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163343961313735326261376436303131623538383330633236623634 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit: BPF prog-id=149 op=LOAD Apr 12 18:54:21.920000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024e98 items=0 ppid=3355 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163343961313735326261376436303131623538383330633236623634 Apr 12 18:54:21.920000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:54:21.920000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.920000 audit: BPF prog-id=150 op=LOAD Apr 12 18:54:21.920000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024f28 items=0 ppid=3355 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163343961313735326261376436303131623538383330633236623634 Apr 12 18:54:21.946924 env[1648]: time="2024-04-12T18:54:21.946874305Z" level=info msg="StartContainer for \"1c49a1752ba7d6011b58830c26b64b0bbe14a997bf81f8ebc126afc47afae2c8\" returns successfully" Apr 12 18:54:21.954329 systemd[1]: cri-containerd-1c49a1752ba7d6011b58830c26b64b0bbe14a997bf81f8ebc126afc47afae2c8.scope: Deactivated successfully. Apr 12 18:54:21.958000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:54:21.979071 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1c49a1752ba7d6011b58830c26b64b0bbe14a997bf81f8ebc126afc47afae2c8-rootfs.mount: Deactivated successfully. Apr 12 18:54:22.048032 env[1648]: time="2024-04-12T18:54:22.047979027Z" level=info msg="shim disconnected" id=1c49a1752ba7d6011b58830c26b64b0bbe14a997bf81f8ebc126afc47afae2c8 Apr 12 18:54:22.048350 env[1648]: time="2024-04-12T18:54:22.048087398Z" level=warning msg="cleaning up after shim disconnected" id=1c49a1752ba7d6011b58830c26b64b0bbe14a997bf81f8ebc126afc47afae2c8 namespace=k8s.io Apr 12 18:54:22.048350 env[1648]: time="2024-04-12T18:54:22.048103000Z" level=info msg="cleaning up dead shim" Apr 12 18:54:22.056746 env[1648]: time="2024-04-12T18:54:22.056690179Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:54:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3562 runtime=io.containerd.runc.v2\n" Apr 12 18:54:22.062737 kubelet[2657]: I0412 18:54:22.062710 2657 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:54:22.088076 kubelet[2657]: I0412 18:54:22.085457 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-87d64c755-bx77g" podStartSLOduration=3.417048538 podStartE2EDuration="6.08540935s" podCreationTimestamp="2024-04-12 18:54:16 +0000 UTC" firstStartedPulling="2024-04-12 18:54:17.226034675 +0000 UTC m=+20.474509204" lastFinishedPulling="2024-04-12 18:54:19.894395474 +0000 UTC m=+23.142870016" observedRunningTime="2024-04-12 18:54:21.094701996 +0000 UTC m=+24.343176540" watchObservedRunningTime="2024-04-12 18:54:22.08540935 +0000 UTC m=+25.333883894" Apr 12 18:54:22.089804 env[1648]: time="2024-04-12T18:54:22.089549606Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:54:22.944185 kubelet[2657]: E0412 18:54:22.944154 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nzrsx" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" Apr 12 18:54:24.945183 kubelet[2657]: E0412 18:54:24.945144 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nzrsx" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" Apr 12 18:54:26.744280 env[1648]: time="2024-04-12T18:54:26.742514040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:26.744825 env[1648]: time="2024-04-12T18:54:26.744674309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:26.747427 env[1648]: time="2024-04-12T18:54:26.747345391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:26.749887 env[1648]: time="2024-04-12T18:54:26.749857289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:26.750609 env[1648]: time="2024-04-12T18:54:26.750575434Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:54:26.753631 env[1648]: time="2024-04-12T18:54:26.753598661Z" level=info msg="CreateContainer within sandbox \"c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:54:26.769425 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1774257723.mount: Deactivated successfully. Apr 12 18:54:26.780625 env[1648]: time="2024-04-12T18:54:26.780582416Z" level=info msg="CreateContainer within sandbox \"c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"87d2cdcfd2dfa5feacc05fb7fd9a262b169fb8509b80d4b3dcaf1dcb29fc0fd1\"" Apr 12 18:54:26.782747 env[1648]: time="2024-04-12T18:54:26.781398600Z" level=info msg="StartContainer for \"87d2cdcfd2dfa5feacc05fb7fd9a262b169fb8509b80d4b3dcaf1dcb29fc0fd1\"" Apr 12 18:54:26.807297 systemd[1]: Started cri-containerd-87d2cdcfd2dfa5feacc05fb7fd9a262b169fb8509b80d4b3dcaf1dcb29fc0fd1.scope. Apr 12 18:54:26.847088 kernel: kauditd_printk_skb: 154 callbacks suppressed Apr 12 18:54:26.847340 kernel: audit: type=1400 audit(1712948066.838:1178): avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.857879 kernel: audit: type=1300 audit(1712948066.838:1178): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f2f04c2da18 items=0 ppid=3355 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.838000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f2f04c2da18 items=0 ppid=3355 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643263646366643264666135666561636330356662376664396132 Apr 12 18:54:26.872530 kernel: audit: type=1327 audit(1712948066.838:1178): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643263646366643264666135666561636330356662376664396132 Apr 12 18:54:26.872634 kernel: audit: type=1400 audit(1712948066.838:1179): avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.878412 kernel: audit: type=1400 audit(1712948066.838:1179): avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.884344 kernel: audit: type=1400 audit(1712948066.838:1179): avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.890847 env[1648]: time="2024-04-12T18:54:26.889267309Z" level=info msg="StartContainer for \"87d2cdcfd2dfa5feacc05fb7fd9a262b169fb8509b80d4b3dcaf1dcb29fc0fd1\" returns successfully" Apr 12 18:54:26.892743 kernel: audit: type=1400 audit(1712948066.838:1179): avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.904614 kernel: audit: type=1400 audit(1712948066.838:1179): avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.904706 kernel: audit: type=1400 audit(1712948066.838:1179): avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.912388 kernel: audit: type=1400 audit(1712948066.838:1179): avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.838000 audit: BPF prog-id=151 op=LOAD Apr 12 18:54:26.838000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003d2108 items=0 ppid=3355 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643263646366643264666135666561636330356662376664396132 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.840000 audit: BPF prog-id=152 op=LOAD Apr 12 18:54:26.840000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003d2158 items=0 ppid=3355 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643263646366643264666135666561636330356662376664396132 Apr 12 18:54:26.846000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:54:26.846000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.846000 audit: BPF prog-id=153 op=LOAD Apr 12 18:54:26.846000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003d21e8 items=0 ppid=3355 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643263646366643264666135666561636330356662376664396132 Apr 12 18:54:26.944476 kubelet[2657]: E0412 18:54:26.944437 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nzrsx" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" Apr 12 18:54:27.549486 env[1648]: time="2024-04-12T18:54:27.549421059Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:54:27.552126 systemd[1]: cri-containerd-87d2cdcfd2dfa5feacc05fb7fd9a262b169fb8509b80d4b3dcaf1dcb29fc0fd1.scope: Deactivated successfully. Apr 12 18:54:27.554000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:54:27.573991 kubelet[2657]: I0412 18:54:27.573967 2657 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 18:54:27.586749 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-87d2cdcfd2dfa5feacc05fb7fd9a262b169fb8509b80d4b3dcaf1dcb29fc0fd1-rootfs.mount: Deactivated successfully. Apr 12 18:54:27.619065 kubelet[2657]: I0412 18:54:27.619034 2657 topology_manager.go:215] "Topology Admit Handler" podUID="9360f804-7614-4887-b5a4-78096088bf28" podNamespace="kube-system" podName="coredns-76f75df574-zb92d" Apr 12 18:54:27.627882 systemd[1]: Created slice kubepods-burstable-pod9360f804_7614_4887_b5a4_78096088bf28.slice. Apr 12 18:54:27.633356 kubelet[2657]: I0412 18:54:27.633333 2657 topology_manager.go:215] "Topology Admit Handler" podUID="3ac62c03-6eaf-4fa2-aa3a-232c595f0993" podNamespace="kube-system" podName="coredns-76f75df574-tvfh2" Apr 12 18:54:27.636454 kubelet[2657]: I0412 18:54:27.636324 2657 topology_manager.go:215] "Topology Admit Handler" podUID="018f23ab-cb55-41c2-bf3e-4d8ab8732669" podNamespace="calico-system" podName="calico-kube-controllers-555bc98ffc-2988q" Apr 12 18:54:27.642328 systemd[1]: Created slice kubepods-burstable-pod3ac62c03_6eaf_4fa2_aa3a_232c595f0993.slice. Apr 12 18:54:27.647722 systemd[1]: Created slice kubepods-besteffort-pod018f23ab_cb55_41c2_bf3e_4d8ab8732669.slice. Apr 12 18:54:27.652443 kubelet[2657]: I0412 18:54:27.652404 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/018f23ab-cb55-41c2-bf3e-4d8ab8732669-tigera-ca-bundle\") pod \"calico-kube-controllers-555bc98ffc-2988q\" (UID: \"018f23ab-cb55-41c2-bf3e-4d8ab8732669\") " pod="calico-system/calico-kube-controllers-555bc98ffc-2988q" Apr 12 18:54:27.652582 kubelet[2657]: I0412 18:54:27.652451 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vpnjp\" (UniqueName: \"kubernetes.io/projected/9360f804-7614-4887-b5a4-78096088bf28-kube-api-access-vpnjp\") pod \"coredns-76f75df574-zb92d\" (UID: \"9360f804-7614-4887-b5a4-78096088bf28\") " pod="kube-system/coredns-76f75df574-zb92d" Apr 12 18:54:27.652582 kubelet[2657]: I0412 18:54:27.652483 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9360f804-7614-4887-b5a4-78096088bf28-config-volume\") pod \"coredns-76f75df574-zb92d\" (UID: \"9360f804-7614-4887-b5a4-78096088bf28\") " pod="kube-system/coredns-76f75df574-zb92d" Apr 12 18:54:27.652582 kubelet[2657]: I0412 18:54:27.652519 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gv792\" (UniqueName: \"kubernetes.io/projected/3ac62c03-6eaf-4fa2-aa3a-232c595f0993-kube-api-access-gv792\") pod \"coredns-76f75df574-tvfh2\" (UID: \"3ac62c03-6eaf-4fa2-aa3a-232c595f0993\") " pod="kube-system/coredns-76f75df574-tvfh2" Apr 12 18:54:27.652582 kubelet[2657]: I0412 18:54:27.652547 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3ac62c03-6eaf-4fa2-aa3a-232c595f0993-config-volume\") pod \"coredns-76f75df574-tvfh2\" (UID: \"3ac62c03-6eaf-4fa2-aa3a-232c595f0993\") " pod="kube-system/coredns-76f75df574-tvfh2" Apr 12 18:54:27.652582 kubelet[2657]: I0412 18:54:27.652576 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tttjr\" (UniqueName: \"kubernetes.io/projected/018f23ab-cb55-41c2-bf3e-4d8ab8732669-kube-api-access-tttjr\") pod \"calico-kube-controllers-555bc98ffc-2988q\" (UID: \"018f23ab-cb55-41c2-bf3e-4d8ab8732669\") " pod="calico-system/calico-kube-controllers-555bc98ffc-2988q" Apr 12 18:54:27.848389 env[1648]: time="2024-04-12T18:54:27.847882455Z" level=info msg="shim disconnected" id=87d2cdcfd2dfa5feacc05fb7fd9a262b169fb8509b80d4b3dcaf1dcb29fc0fd1 Apr 12 18:54:27.848389 env[1648]: time="2024-04-12T18:54:27.848002262Z" level=warning msg="cleaning up after shim disconnected" id=87d2cdcfd2dfa5feacc05fb7fd9a262b169fb8509b80d4b3dcaf1dcb29fc0fd1 namespace=k8s.io Apr 12 18:54:27.848389 env[1648]: time="2024-04-12T18:54:27.848014666Z" level=info msg="cleaning up dead shim" Apr 12 18:54:27.858298 env[1648]: time="2024-04-12T18:54:27.858242138Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:54:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3632 runtime=io.containerd.runc.v2\n" Apr 12 18:54:27.932283 env[1648]: time="2024-04-12T18:54:27.932236727Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-zb92d,Uid:9360f804-7614-4887-b5a4-78096088bf28,Namespace:kube-system,Attempt:0,}" Apr 12 18:54:27.959419 env[1648]: time="2024-04-12T18:54:27.959379623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-tvfh2,Uid:3ac62c03-6eaf-4fa2-aa3a-232c595f0993,Namespace:kube-system,Attempt:0,}" Apr 12 18:54:27.960308 env[1648]: time="2024-04-12T18:54:27.960270518Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-555bc98ffc-2988q,Uid:018f23ab-cb55-41c2-bf3e-4d8ab8732669,Namespace:calico-system,Attempt:0,}" Apr 12 18:54:28.085640 env[1648]: time="2024-04-12T18:54:28.082642012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:54:28.183488 env[1648]: time="2024-04-12T18:54:28.183077278Z" level=error msg="Failed to destroy network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.183699 env[1648]: time="2024-04-12T18:54:28.183647655Z" level=error msg="encountered an error cleaning up failed sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.183784 env[1648]: time="2024-04-12T18:54:28.183721151Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-555bc98ffc-2988q,Uid:018f23ab-cb55-41c2-bf3e-4d8ab8732669,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.184123 kubelet[2657]: E0412 18:54:28.184084 2657 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.184570 kubelet[2657]: E0412 18:54:28.184157 2657 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-555bc98ffc-2988q" Apr 12 18:54:28.184570 kubelet[2657]: E0412 18:54:28.184187 2657 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-555bc98ffc-2988q" Apr 12 18:54:28.184570 kubelet[2657]: E0412 18:54:28.184258 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-555bc98ffc-2988q_calico-system(018f23ab-cb55-41c2-bf3e-4d8ab8732669)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-555bc98ffc-2988q_calico-system(018f23ab-cb55-41c2-bf3e-4d8ab8732669)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-555bc98ffc-2988q" podUID="018f23ab-cb55-41c2-bf3e-4d8ab8732669" Apr 12 18:54:28.203535 env[1648]: time="2024-04-12T18:54:28.203473468Z" level=error msg="Failed to destroy network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.203979 env[1648]: time="2024-04-12T18:54:28.203847136Z" level=error msg="encountered an error cleaning up failed sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.204075 env[1648]: time="2024-04-12T18:54:28.203993083Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-tvfh2,Uid:3ac62c03-6eaf-4fa2-aa3a-232c595f0993,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.204390 kubelet[2657]: E0412 18:54:28.204300 2657 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.204499 kubelet[2657]: E0412 18:54:28.204424 2657 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-tvfh2" Apr 12 18:54:28.204499 kubelet[2657]: E0412 18:54:28.204453 2657 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-tvfh2" Apr 12 18:54:28.204690 kubelet[2657]: E0412 18:54:28.204526 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-tvfh2_kube-system(3ac62c03-6eaf-4fa2-aa3a-232c595f0993)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-tvfh2_kube-system(3ac62c03-6eaf-4fa2-aa3a-232c595f0993)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-tvfh2" podUID="3ac62c03-6eaf-4fa2-aa3a-232c595f0993" Apr 12 18:54:28.211621 env[1648]: time="2024-04-12T18:54:28.211559348Z" level=error msg="Failed to destroy network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.212001 env[1648]: time="2024-04-12T18:54:28.211903561Z" level=error msg="encountered an error cleaning up failed sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.212102 env[1648]: time="2024-04-12T18:54:28.212022718Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-zb92d,Uid:9360f804-7614-4887-b5a4-78096088bf28,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.212307 kubelet[2657]: E0412 18:54:28.212282 2657 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:28.212427 kubelet[2657]: E0412 18:54:28.212341 2657 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-zb92d" Apr 12 18:54:28.212427 kubelet[2657]: E0412 18:54:28.212400 2657 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-zb92d" Apr 12 18:54:28.212531 kubelet[2657]: E0412 18:54:28.212471 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-zb92d_kube-system(9360f804-7614-4887-b5a4-78096088bf28)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-zb92d_kube-system(9360f804-7614-4887-b5a4-78096088bf28)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-zb92d" podUID="9360f804-7614-4887-b5a4-78096088bf28" Apr 12 18:54:28.591489 kubelet[2657]: I0412 18:54:28.591165 2657 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:54:28.640000 audit[3738]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3738 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:28.640000 audit[3738]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffecb2ec120 a2=0 a3=7ffecb2ec10c items=0 ppid=3054 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:28.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:28.641000 audit[3738]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3738 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:28.641000 audit[3738]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffecb2ec120 a2=0 a3=7ffecb2ec10c items=0 ppid=3054 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:28.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:28.802249 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147-shm.mount: Deactivated successfully. Apr 12 18:54:28.802554 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a-shm.mount: Deactivated successfully. Apr 12 18:54:28.950720 systemd[1]: Created slice kubepods-besteffort-pod6bafbd32_21fe_46f8_9db9_21478e19beab.slice. Apr 12 18:54:28.953622 env[1648]: time="2024-04-12T18:54:28.953585473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nzrsx,Uid:6bafbd32-21fe-46f8-9db9-21478e19beab,Namespace:calico-system,Attempt:0,}" Apr 12 18:54:29.033035 env[1648]: time="2024-04-12T18:54:29.032983910Z" level=error msg="Failed to destroy network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:29.035861 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c-shm.mount: Deactivated successfully. Apr 12 18:54:29.036994 env[1648]: time="2024-04-12T18:54:29.036941163Z" level=error msg="encountered an error cleaning up failed sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:29.037147 env[1648]: time="2024-04-12T18:54:29.037017004Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nzrsx,Uid:6bafbd32-21fe-46f8-9db9-21478e19beab,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:29.037391 kubelet[2657]: E0412 18:54:29.037349 2657 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:29.037491 kubelet[2657]: E0412 18:54:29.037451 2657 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nzrsx" Apr 12 18:54:29.037491 kubelet[2657]: E0412 18:54:29.037481 2657 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nzrsx" Apr 12 18:54:29.037606 kubelet[2657]: E0412 18:54:29.037556 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nzrsx_calico-system(6bafbd32-21fe-46f8-9db9-21478e19beab)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nzrsx_calico-system(6bafbd32-21fe-46f8-9db9-21478e19beab)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nzrsx" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" Apr 12 18:54:29.084179 kubelet[2657]: I0412 18:54:29.084138 2657 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:29.086604 kubelet[2657]: I0412 18:54:29.086347 2657 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:29.087030 env[1648]: time="2024-04-12T18:54:29.086993692Z" level=info msg="StopPodSandbox for \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\"" Apr 12 18:54:29.088122 env[1648]: time="2024-04-12T18:54:29.088094234Z" level=info msg="StopPodSandbox for \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\"" Apr 12 18:54:29.090952 kubelet[2657]: I0412 18:54:29.090419 2657 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:29.091219 env[1648]: time="2024-04-12T18:54:29.091189520Z" level=info msg="StopPodSandbox for \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\"" Apr 12 18:54:29.095195 kubelet[2657]: I0412 18:54:29.095168 2657 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:29.097499 env[1648]: time="2024-04-12T18:54:29.097419809Z" level=info msg="StopPodSandbox for \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\"" Apr 12 18:54:29.250954 env[1648]: time="2024-04-12T18:54:29.250886462Z" level=error msg="StopPodSandbox for \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\" failed" error="failed to destroy network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:29.251447 kubelet[2657]: E0412 18:54:29.251422 2657 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:29.251842 kubelet[2657]: E0412 18:54:29.251519 2657 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147"} Apr 12 18:54:29.251842 kubelet[2657]: E0412 18:54:29.251572 2657 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3ac62c03-6eaf-4fa2-aa3a-232c595f0993\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:29.251842 kubelet[2657]: E0412 18:54:29.251611 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3ac62c03-6eaf-4fa2-aa3a-232c595f0993\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-tvfh2" podUID="3ac62c03-6eaf-4fa2-aa3a-232c595f0993" Apr 12 18:54:29.256903 env[1648]: time="2024-04-12T18:54:29.256845322Z" level=error msg="StopPodSandbox for \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\" failed" error="failed to destroy network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:29.257185 kubelet[2657]: E0412 18:54:29.257160 2657 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:29.257275 kubelet[2657]: E0412 18:54:29.257208 2657 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c"} Apr 12 18:54:29.257275 kubelet[2657]: E0412 18:54:29.257259 2657 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6bafbd32-21fe-46f8-9db9-21478e19beab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:29.257630 kubelet[2657]: E0412 18:54:29.257297 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6bafbd32-21fe-46f8-9db9-21478e19beab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nzrsx" podUID="6bafbd32-21fe-46f8-9db9-21478e19beab" Apr 12 18:54:29.273740 env[1648]: time="2024-04-12T18:54:29.273676164Z" level=error msg="StopPodSandbox for \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\" failed" error="failed to destroy network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:29.274095 kubelet[2657]: E0412 18:54:29.273930 2657 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:29.274095 kubelet[2657]: E0412 18:54:29.273974 2657 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b"} Apr 12 18:54:29.274095 kubelet[2657]: E0412 18:54:29.274022 2657 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"018f23ab-cb55-41c2-bf3e-4d8ab8732669\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:29.274095 kubelet[2657]: E0412 18:54:29.274061 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"018f23ab-cb55-41c2-bf3e-4d8ab8732669\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-555bc98ffc-2988q" podUID="018f23ab-cb55-41c2-bf3e-4d8ab8732669" Apr 12 18:54:29.276823 env[1648]: time="2024-04-12T18:54:29.276672897Z" level=error msg="StopPodSandbox for \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\" failed" error="failed to destroy network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:29.277078 kubelet[2657]: E0412 18:54:29.277043 2657 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:29.277160 kubelet[2657]: E0412 18:54:29.277132 2657 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a"} Apr 12 18:54:29.277211 kubelet[2657]: E0412 18:54:29.277202 2657 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9360f804-7614-4887-b5a4-78096088bf28\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:29.277323 kubelet[2657]: E0412 18:54:29.277272 2657 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9360f804-7614-4887-b5a4-78096088bf28\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-zb92d" podUID="9360f804-7614-4887-b5a4-78096088bf28" Apr 12 18:54:33.890787 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1718076617.mount: Deactivated successfully. Apr 12 18:54:33.968599 env[1648]: time="2024-04-12T18:54:33.968549744Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:33.971461 env[1648]: time="2024-04-12T18:54:33.971424311Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:33.973451 env[1648]: time="2024-04-12T18:54:33.973420143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:33.975784 env[1648]: time="2024-04-12T18:54:33.975753308Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:33.976316 env[1648]: time="2024-04-12T18:54:33.976278422Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:54:33.993513 env[1648]: time="2024-04-12T18:54:33.993474770Z" level=info msg="CreateContainer within sandbox \"c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:54:34.016307 env[1648]: time="2024-04-12T18:54:34.016255636Z" level=info msg="CreateContainer within sandbox \"c299d851d7189e85dfb3e04ea14470386427ffe8b42834607215ea6521501a88\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fee77324393c6b7e003d12b4bd3e3d4ad19587e4fe5261213f8185b55907a21d\"" Apr 12 18:54:34.017180 env[1648]: time="2024-04-12T18:54:34.017151784Z" level=info msg="StartContainer for \"fee77324393c6b7e003d12b4bd3e3d4ad19587e4fe5261213f8185b55907a21d\"" Apr 12 18:54:34.039676 systemd[1]: Started cri-containerd-fee77324393c6b7e003d12b4bd3e3d4ad19587e4fe5261213f8185b55907a21d.scope. Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.073594 kernel: kauditd_printk_skb: 40 callbacks suppressed Apr 12 18:54:34.073838 kernel: audit: type=1400 audit(1712948074.070:1187): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.088327 kernel: audit: type=1300 audit(1712948074.070:1187): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f16b37c2608 items=0 ppid=3355 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:34.070000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f16b37c2608 items=0 ppid=3355 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:34.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653737333234333933633662376530303364313262346264336533 Apr 12 18:54:34.101626 kernel: audit: type=1327 audit(1712948074.070:1187): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653737333234333933633662376530303364313262346264336533 Apr 12 18:54:34.101735 kernel: audit: type=1400 audit(1712948074.070:1188): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.108721 kernel: audit: type=1400 audit(1712948074.070:1188): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.115550 kernel: audit: type=1400 audit(1712948074.070:1188): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.121457 kernel: audit: type=1400 audit(1712948074.070:1188): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.133060 kernel: audit: type=1400 audit(1712948074.070:1188): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.133159 kernel: audit: type=1400 audit(1712948074.070:1188): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.141385 kernel: audit: type=1400 audit(1712948074.070:1188): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.070000 audit: BPF prog-id=154 op=LOAD Apr 12 18:54:34.070000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00031cf68 items=0 ppid=3355 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:34.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653737333234333933633662376530303364313262346264336533 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit: BPF prog-id=155 op=LOAD Apr 12 18:54:34.078000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00031cfb8 items=0 ppid=3355 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:34.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653737333234333933633662376530303364313262346264336533 Apr 12 18:54:34.078000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:54:34.078000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:34.078000 audit: BPF prog-id=156 op=LOAD Apr 12 18:54:34.078000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00031d048 items=0 ppid=3355 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:34.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653737333234333933633662376530303364313262346264336533 Apr 12 18:54:34.145002 env[1648]: time="2024-04-12T18:54:34.143091657Z" level=info msg="StartContainer for \"fee77324393c6b7e003d12b4bd3e3d4ad19587e4fe5261213f8185b55907a21d\" returns successfully" Apr 12 18:54:34.242933 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:54:34.243060 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:54:35.150763 kubelet[2657]: I0412 18:54:35.150729 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-wkhnh" podStartSLOduration=2.490908052 podStartE2EDuration="19.150034871s" podCreationTimestamp="2024-04-12 18:54:16 +0000 UTC" firstStartedPulling="2024-04-12 18:54:17.317509631 +0000 UTC m=+20.565984167" lastFinishedPulling="2024-04-12 18:54:33.976636461 +0000 UTC m=+37.225110986" observedRunningTime="2024-04-12 18:54:35.13901579 +0000 UTC m=+38.387490333" watchObservedRunningTime="2024-04-12 18:54:35.150034871 +0000 UTC m=+38.398509414" Apr 12 18:54:35.665000 audit[3959]: AVC avc: denied { write } for pid=3959 comm="tee" name="fd" dev="proc" ino=25232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:35.665000 audit[3959]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffa6c2985 a2=241 a3=1b6 items=1 ppid=3926 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.665000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:54:35.665000 audit: PATH item=0 name="/dev/fd/63" inode=25211 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:35.665000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:35.706000 audit[3987]: AVC avc: denied { write } for pid=3987 comm="tee" name="fd" dev="proc" ino=24391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:35.706000 audit[3987]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef8f2c976 a2=241 a3=1b6 items=1 ppid=3935 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.706000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:54:35.706000 audit: PATH item=0 name="/dev/fd/63" inode=25234 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:35.706000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:35.710000 audit[3990]: AVC avc: denied { write } for pid=3990 comm="tee" name="fd" dev="proc" ino=24395 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:35.710000 audit[3990]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9a0f2975 a2=241 a3=1b6 items=1 ppid=3925 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.710000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:54:35.710000 audit: PATH item=0 name="/dev/fd/63" inode=25235 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:35.710000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:35.715000 audit[3969]: AVC avc: denied { write } for pid=3969 comm="tee" name="fd" dev="proc" ino=25238 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:35.718000 audit[3995]: AVC avc: denied { write } for pid=3995 comm="tee" name="fd" dev="proc" ino=24400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:35.718000 audit[3995]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd97ef9985 a2=241 a3=1b6 items=1 ppid=3929 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.718000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:54:35.718000 audit: PATH item=0 name="/dev/fd/63" inode=25241 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:35.718000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:35.720000 audit[3997]: AVC avc: denied { write } for pid=3997 comm="tee" name="fd" dev="proc" ino=24404 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:35.720000 audit[3997]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc686db986 a2=241 a3=1b6 items=1 ppid=3947 pid=3997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.720000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:54:35.720000 audit: PATH item=0 name="/dev/fd/63" inode=25242 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:35.720000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:35.715000 audit[3969]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea10e8985 a2=241 a3=1b6 items=1 ppid=3939 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.715000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:54:35.715000 audit: PATH item=0 name="/dev/fd/63" inode=25225 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:35.715000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:35.741000 audit[3993]: AVC avc: denied { write } for pid=3993 comm="tee" name="fd" dev="proc" ino=24408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:35.741000 audit[3993]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa94a1987 a2=241 a3=1b6 items=1 ppid=3933 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.741000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:54:35.741000 audit: PATH item=0 name="/dev/fd/63" inode=24397 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:35.741000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:36.133658 kubelet[2657]: I0412 18:54:36.132129 2657 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:54:36.192656 (udev-worker)[3892]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:54:36.196992 (udev-worker)[4062]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit: BPF prog-id=157 op=LOAD Apr 12 18:54:36.198000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb253f100 a2=70 a3=7ffb18bc7000 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.198000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit: BPF prog-id=158 op=LOAD Apr 12 18:54:36.198000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb253f100 a2=70 a3=6f items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.198000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdb253f0b0 a2=70 a3=7ffdb253f100 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit: BPF prog-id=159 op=LOAD Apr 12 18:54:36.198000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdb253f090 a2=70 a3=7ffdb253f100 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.198000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb253f170 a2=70 a3=0 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb253f160 a2=70 a3=0 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.198000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.198000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb253f0d0 a2=70 a3=0 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdb253f1a0 a2=70 a3=1487f60 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.200000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb253f1a0 a2=70 a3=1484880 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.200000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.200000 audit: BPF prog-id=160 op=LOAD Apr 12 18:54:36.200000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb253f0c0 a2=70 a3=0 items=0 ppid=3931 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.200000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:36.204000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.204000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9821a570 a2=70 a3=fff80800 items=0 ppid=3931 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.204000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:54:36.205000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:36.205000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9821a440 a2=70 a3=3 items=0 ppid=3931 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.205000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:54:36.212000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:54:36.284000 audit[4091]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4091 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:36.284000 audit[4091]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdf14e5b90 a2=0 a3=7ffdf14e5b7c items=0 ppid=3931 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:36.290000 audit[4089]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4089 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:36.290000 audit[4089]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd4e611a80 a2=0 a3=7ffd4e611a6c items=0 ppid=3931 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.290000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:36.294000 audit[4088]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=4088 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:36.294000 audit[4088]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffe50fc3ab0 a2=0 a3=7ffe50fc3a9c items=0 ppid=3931 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.294000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:36.298000 audit[4090]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4090 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:36.298000 audit[4090]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcf666d1d0 a2=0 a3=7ffcf666d1bc items=0 ppid=3931 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.298000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:37.041318 (udev-worker)[4077]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:54:37.043568 systemd-networkd[1460]: vxlan.calico: Link UP Apr 12 18:54:37.043575 systemd-networkd[1460]: vxlan.calico: Gained carrier Apr 12 18:54:38.626638 systemd-networkd[1460]: vxlan.calico: Gained IPv6LL Apr 12 18:54:40.946426 env[1648]: time="2024-04-12T18:54:40.946385507Z" level=info msg="StopPodSandbox for \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\"" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.013 [INFO][4119] k8s.go 585: Cleaning up netns ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.014 [INFO][4119] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" iface="eth0" netns="/var/run/netns/cni-fd27b97f-95f9-5bc8-7d8c-65b3da777c8e" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.014 [INFO][4119] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" iface="eth0" netns="/var/run/netns/cni-fd27b97f-95f9-5bc8-7d8c-65b3da777c8e" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.015 [INFO][4119] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" iface="eth0" netns="/var/run/netns/cni-fd27b97f-95f9-5bc8-7d8c-65b3da777c8e" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.015 [INFO][4119] k8s.go 592: Releasing IP address(es) ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.015 [INFO][4119] utils.go 188: Calico CNI releasing IP address ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.274 [INFO][4125] ipam_plugin.go 415: Releasing address using handleID ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.276 [INFO][4125] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.277 [INFO][4125] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.292 [WARNING][4125] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.293 [INFO][4125] ipam_plugin.go 443: Releasing address using workloadID ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.298 [INFO][4125] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:41.306702 env[1648]: 2024-04-12 18:54:41.304 [INFO][4119] k8s.go 598: Teardown processing complete. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:41.308556 env[1648]: time="2024-04-12T18:54:41.308513858Z" level=info msg="TearDown network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\" successfully" Apr 12 18:54:41.308794 env[1648]: time="2024-04-12T18:54:41.308769108Z" level=info msg="StopPodSandbox for \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\" returns successfully" Apr 12 18:54:41.311040 systemd[1]: run-netns-cni\x2dfd27b97f\x2d95f9\x2d5bc8\x2d7d8c\x2d65b3da777c8e.mount: Deactivated successfully. Apr 12 18:54:41.315294 env[1648]: time="2024-04-12T18:54:41.315265572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-tvfh2,Uid:3ac62c03-6eaf-4fa2-aa3a-232c595f0993,Namespace:kube-system,Attempt:1,}" Apr 12 18:54:41.500690 systemd-networkd[1460]: cali093dd2849d9: Link UP Apr 12 18:54:41.508844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:54:41.508991 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali093dd2849d9: link becomes ready Apr 12 18:54:41.507742 systemd-networkd[1460]: cali093dd2849d9: Gained carrier Apr 12 18:54:41.507903 (udev-worker)[4158]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.398 [INFO][4140] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0 coredns-76f75df574- kube-system 3ac62c03-6eaf-4fa2-aa3a-232c595f0993 672 0 2024-04-12 18:54:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-22-226 coredns-76f75df574-tvfh2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali093dd2849d9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Namespace="kube-system" Pod="coredns-76f75df574-tvfh2" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.398 [INFO][4140] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Namespace="kube-system" Pod="coredns-76f75df574-tvfh2" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.438 [INFO][4151] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" HandleID="k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.449 [INFO][4151] ipam_plugin.go 268: Auto assigning IP ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" HandleID="k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b0610), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-22-226", "pod":"coredns-76f75df574-tvfh2", "timestamp":"2024-04-12 18:54:41.438241388 +0000 UTC"}, Hostname:"ip-172-31-22-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.449 [INFO][4151] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.449 [INFO][4151] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.449 [INFO][4151] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-22-226' Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.452 [INFO][4151] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.461 [INFO][4151] ipam.go 372: Looking up existing affinities for host host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.467 [INFO][4151] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.469 [INFO][4151] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.472 [INFO][4151] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.472 [INFO][4151] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.474 [INFO][4151] ipam.go 1682: Creating new handle: k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2 Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.478 [INFO][4151] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.484 [INFO][4151] ipam.go 1216: Successfully claimed IPs: [192.168.32.1/26] block=192.168.32.0/26 handle="k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.485 [INFO][4151] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.1/26] handle="k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" host="ip-172-31-22-226" Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.485 [INFO][4151] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:41.529463 env[1648]: 2024-04-12 18:54:41.485 [INFO][4151] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.32.1/26] IPv6=[] ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" HandleID="k8s-pod-network.5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.530516 env[1648]: 2024-04-12 18:54:41.494 [INFO][4140] k8s.go 385: Populated endpoint ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Namespace="kube-system" Pod="coredns-76f75df574-tvfh2" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3ac62c03-6eaf-4fa2-aa3a-232c595f0993", ResourceVersion:"672", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"", Pod:"coredns-76f75df574-tvfh2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali093dd2849d9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:41.530516 env[1648]: 2024-04-12 18:54:41.494 [INFO][4140] k8s.go 386: Calico CNI using IPs: [192.168.32.1/32] ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Namespace="kube-system" Pod="coredns-76f75df574-tvfh2" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.530516 env[1648]: 2024-04-12 18:54:41.494 [INFO][4140] dataplane_linux.go 68: Setting the host side veth name to cali093dd2849d9 ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Namespace="kube-system" Pod="coredns-76f75df574-tvfh2" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.530516 env[1648]: 2024-04-12 18:54:41.509 [INFO][4140] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Namespace="kube-system" Pod="coredns-76f75df574-tvfh2" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.530516 env[1648]: 2024-04-12 18:54:41.509 [INFO][4140] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Namespace="kube-system" Pod="coredns-76f75df574-tvfh2" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3ac62c03-6eaf-4fa2-aa3a-232c595f0993", ResourceVersion:"672", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2", Pod:"coredns-76f75df574-tvfh2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali093dd2849d9", MAC:"a6:9f:fe:25:91:f6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:41.530516 env[1648]: 2024-04-12 18:54:41.527 [INFO][4140] k8s.go 498: Wrote updated endpoint to datastore ContainerID="5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2" Namespace="kube-system" Pod="coredns-76f75df574-tvfh2" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:41.565137 env[1648]: time="2024-04-12T18:54:41.561683385Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:41.565531 env[1648]: time="2024-04-12T18:54:41.565488242Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:41.565679 env[1648]: time="2024-04-12T18:54:41.565650859Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:41.565979 env[1648]: time="2024-04-12T18:54:41.565938631Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2 pid=4182 runtime=io.containerd.runc.v2 Apr 12 18:54:41.585000 audit[4197]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4197 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:41.589041 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 18:54:41.589148 kernel: audit: type=1325 audit(1712948081.585:1220): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4197 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:41.613547 kernel: audit: type=1300 audit(1712948081.585:1220): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffeb79ff970 a2=0 a3=7ffeb79ff95c items=0 ppid=3931 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.585000 audit[4197]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffeb79ff970 a2=0 a3=7ffeb79ff95c items=0 ppid=3931 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.585000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:41.619069 systemd[1]: Started cri-containerd-5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2.scope. Apr 12 18:54:41.619538 kernel: audit: type=1327 audit(1712948081.585:1220): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.646842 kernel: audit: type=1400 audit(1712948081.632:1221): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.646965 kernel: audit: type=1400 audit(1712948081.632:1222): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.652951 kernel: audit: type=1400 audit(1712948081.632:1223): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.653050 kernel: audit: type=1400 audit(1712948081.632:1224): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.664276 kernel: audit: type=1400 audit(1712948081.632:1225): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.664660 kernel: audit: type=1400 audit(1712948081.632:1226): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit: BPF prog-id=161 op=LOAD Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4182 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.677594 kernel: audit: type=1400 audit(1712948081.632:1227): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636166356632646430346563323538656639636330626431643939 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4182 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636166356632646430346563323538656639636330626431643939 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.638000 audit: BPF prog-id=162 op=LOAD Apr 12 18:54:41.638000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020b200 items=0 ppid=4182 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636166356632646430346563323538656639636330626431643939 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit: BPF prog-id=163 op=LOAD Apr 12 18:54:41.645000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020b248 items=0 ppid=4182 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636166356632646430346563323538656639636330626431643939 Apr 12 18:54:41.645000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:54:41.645000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.645000 audit: BPF prog-id=164 op=LOAD Apr 12 18:54:41.645000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020b658 items=0 ppid=4182 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636166356632646430346563323538656639636330626431643939 Apr 12 18:54:41.704914 env[1648]: time="2024-04-12T18:54:41.704589968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-tvfh2,Uid:3ac62c03-6eaf-4fa2-aa3a-232c595f0993,Namespace:kube-system,Attempt:1,} returns sandbox id \"5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2\"" Apr 12 18:54:41.708601 env[1648]: time="2024-04-12T18:54:41.707839017Z" level=info msg="CreateContainer within sandbox \"5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:54:41.739706 env[1648]: time="2024-04-12T18:54:41.739665743Z" level=info msg="CreateContainer within sandbox \"5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"505932569701cbcd5328992df03273e973b6ef8328241297da6405df50918561\"" Apr 12 18:54:41.741965 env[1648]: time="2024-04-12T18:54:41.741940772Z" level=info msg="StartContainer for \"505932569701cbcd5328992df03273e973b6ef8328241297da6405df50918561\"" Apr 12 18:54:41.783249 systemd[1]: Started cri-containerd-505932569701cbcd5328992df03273e973b6ef8328241297da6405df50918561.scope. Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.805000 audit: BPF prog-id=165 op=LOAD Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4182 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530353933323536393730316362636435333238393932646630333237 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4182 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530353933323536393730316362636435333238393932646630333237 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit: BPF prog-id=166 op=LOAD Apr 12 18:54:41.806000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002a3290 items=0 ppid=4182 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530353933323536393730316362636435333238393932646630333237 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit: BPF prog-id=167 op=LOAD Apr 12 18:54:41.806000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002a32d8 items=0 ppid=4182 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530353933323536393730316362636435333238393932646630333237 Apr 12 18:54:41.806000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:54:41.806000 audit: BPF prog-id=166 op=UNLOAD Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:41.806000 audit: BPF prog-id=168 op=LOAD Apr 12 18:54:41.806000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002a36e8 items=0 ppid=4182 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530353933323536393730316362636435333238393932646630333237 Apr 12 18:54:41.829900 env[1648]: time="2024-04-12T18:54:41.829819760Z" level=info msg="StartContainer for \"505932569701cbcd5328992df03273e973b6ef8328241297da6405df50918561\" returns successfully" Apr 12 18:54:41.944741 env[1648]: time="2024-04-12T18:54:41.944674408Z" level=info msg="StopPodSandbox for \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\"" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.017 [INFO][4263] k8s.go 585: Cleaning up netns ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.017 [INFO][4263] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" iface="eth0" netns="/var/run/netns/cni-c1377787-0677-4fe2-6cc8-3c03b5a1d624" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.017 [INFO][4263] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" iface="eth0" netns="/var/run/netns/cni-c1377787-0677-4fe2-6cc8-3c03b5a1d624" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.018 [INFO][4263] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" iface="eth0" netns="/var/run/netns/cni-c1377787-0677-4fe2-6cc8-3c03b5a1d624" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.018 [INFO][4263] k8s.go 592: Releasing IP address(es) ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.018 [INFO][4263] utils.go 188: Calico CNI releasing IP address ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.065 [INFO][4270] ipam_plugin.go 415: Releasing address using handleID ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.065 [INFO][4270] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.065 [INFO][4270] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.073 [WARNING][4270] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.073 [INFO][4270] ipam_plugin.go 443: Releasing address using workloadID ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.074 [INFO][4270] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:42.078338 env[1648]: 2024-04-12 18:54:42.076 [INFO][4263] k8s.go 598: Teardown processing complete. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:42.080247 env[1648]: time="2024-04-12T18:54:42.078511105Z" level=info msg="TearDown network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\" successfully" Apr 12 18:54:42.080247 env[1648]: time="2024-04-12T18:54:42.078550586Z" level=info msg="StopPodSandbox for \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\" returns successfully" Apr 12 18:54:42.080247 env[1648]: time="2024-04-12T18:54:42.079541824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nzrsx,Uid:6bafbd32-21fe-46f8-9db9-21478e19beab,Namespace:calico-system,Attempt:1,}" Apr 12 18:54:42.248000 audit[4298]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:42.248000 audit[4298]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff57e858e0 a2=0 a3=7fff57e858cc items=0 ppid=3054 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:42.252000 audit[4298]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:42.252000 audit[4298]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff57e858e0 a2=0 a3=0 items=0 ppid=3054 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:42.272836 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calida62161cbac: link becomes ready Apr 12 18:54:42.272493 systemd-networkd[1460]: calida62161cbac: Link UP Apr 12 18:54:42.273358 systemd-networkd[1460]: calida62161cbac: Gained carrier Apr 12 18:54:42.298111 kubelet[2657]: I0412 18:54:42.298076 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-tvfh2" podStartSLOduration=31.298020031 podStartE2EDuration="31.298020031s" podCreationTimestamp="2024-04-12 18:54:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:54:42.199046011 +0000 UTC m=+45.447520558" watchObservedRunningTime="2024-04-12 18:54:42.298020031 +0000 UTC m=+45.546494575" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.141 [INFO][4277] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0 csi-node-driver- calico-system 6bafbd32-21fe-46f8-9db9-21478e19beab 682 0 2024-04-12 18:54:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-22-226 csi-node-driver-nzrsx eth0 default [] [] [kns.calico-system ksa.calico-system.default] calida62161cbac [] []}} ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Namespace="calico-system" Pod="csi-node-driver-nzrsx" WorkloadEndpoint="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.141 [INFO][4277] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Namespace="calico-system" Pod="csi-node-driver-nzrsx" WorkloadEndpoint="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.195 [INFO][4291] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" HandleID="k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.214 [INFO][4291] ipam_plugin.go 268: Auto assigning IP ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" HandleID="k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f9d50), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-22-226", "pod":"csi-node-driver-nzrsx", "timestamp":"2024-04-12 18:54:42.195213327 +0000 UTC"}, Hostname:"ip-172-31-22-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.215 [INFO][4291] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.215 [INFO][4291] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.215 [INFO][4291] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-22-226' Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.218 [INFO][4291] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.231 [INFO][4291] ipam.go 372: Looking up existing affinities for host host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.237 [INFO][4291] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.246 [INFO][4291] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.249 [INFO][4291] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.249 [INFO][4291] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.252 [INFO][4291] ipam.go 1682: Creating new handle: k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67 Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.258 [INFO][4291] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.263 [INFO][4291] ipam.go 1216: Successfully claimed IPs: [192.168.32.2/26] block=192.168.32.0/26 handle="k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.263 [INFO][4291] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.2/26] handle="k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" host="ip-172-31-22-226" Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.263 [INFO][4291] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:42.301791 env[1648]: 2024-04-12 18:54:42.263 [INFO][4291] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.32.2/26] IPv6=[] ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" HandleID="k8s-pod-network.b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.303336 env[1648]: 2024-04-12 18:54:42.266 [INFO][4277] k8s.go 385: Populated endpoint ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Namespace="calico-system" Pod="csi-node-driver-nzrsx" WorkloadEndpoint="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6bafbd32-21fe-46f8-9db9-21478e19beab", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"", Pod:"csi-node-driver-nzrsx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calida62161cbac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:42.303336 env[1648]: 2024-04-12 18:54:42.266 [INFO][4277] k8s.go 386: Calico CNI using IPs: [192.168.32.2/32] ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Namespace="calico-system" Pod="csi-node-driver-nzrsx" WorkloadEndpoint="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.303336 env[1648]: 2024-04-12 18:54:42.266 [INFO][4277] dataplane_linux.go 68: Setting the host side veth name to calida62161cbac ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Namespace="calico-system" Pod="csi-node-driver-nzrsx" WorkloadEndpoint="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.303336 env[1648]: 2024-04-12 18:54:42.276 [INFO][4277] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Namespace="calico-system" Pod="csi-node-driver-nzrsx" WorkloadEndpoint="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.303336 env[1648]: 2024-04-12 18:54:42.277 [INFO][4277] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Namespace="calico-system" Pod="csi-node-driver-nzrsx" WorkloadEndpoint="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6bafbd32-21fe-46f8-9db9-21478e19beab", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67", Pod:"csi-node-driver-nzrsx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calida62161cbac", MAC:"9a:65:d8:82:85:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:42.303336 env[1648]: 2024-04-12 18:54:42.298 [INFO][4277] k8s.go 498: Wrote updated endpoint to datastore ContainerID="b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67" Namespace="calico-system" Pod="csi-node-driver-nzrsx" WorkloadEndpoint="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:42.320110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4285056846.mount: Deactivated successfully. Apr 12 18:54:42.320229 systemd[1]: run-netns-cni\x2dc1377787\x2d0677\x2d4fe2\x2d6cc8\x2d3c03b5a1d624.mount: Deactivated successfully. Apr 12 18:54:42.341464 env[1648]: time="2024-04-12T18:54:42.341298279Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:42.341464 env[1648]: time="2024-04-12T18:54:42.341420035Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:42.341464 env[1648]: time="2024-04-12T18:54:42.341453340Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:42.341816 env[1648]: time="2024-04-12T18:54:42.341611338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67 pid=4322 runtime=io.containerd.runc.v2 Apr 12 18:54:42.380610 systemd[1]: Started cri-containerd-b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67.scope. Apr 12 18:54:42.400000 audit[4345]: NETFILTER_CFG table=filter:104 family=2 entries=40 op=nft_register_chain pid=4345 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:42.400000 audit[4345]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7ffcf38d6350 a2=0 a3=7ffcf38d633c items=0 ppid=3931 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.400000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit: BPF prog-id=169 op=LOAD Apr 12 18:54:42.407000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643432363662303863333663343463666465666432376639373139 Apr 12 18:54:42.407000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.407000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643432363662303863333663343463666465666432376639373139 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit: BPF prog-id=170 op=LOAD Apr 12 18:54:42.408000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003c6190 items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643432363662303863333663343463666465666432376639373139 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit: BPF prog-id=171 op=LOAD Apr 12 18:54:42.408000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003c61d8 items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643432363662303863333663343463666465666432376639373139 Apr 12 18:54:42.408000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:54:42.408000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:42.408000 audit: BPF prog-id=172 op=LOAD Apr 12 18:54:42.408000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003c65e8 items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643432363662303863333663343463666465666432376639373139 Apr 12 18:54:42.426660 env[1648]: time="2024-04-12T18:54:42.426512503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nzrsx,Uid:6bafbd32-21fe-46f8-9db9-21478e19beab,Namespace:calico-system,Attempt:1,} returns sandbox id \"b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67\"" Apr 12 18:54:42.428918 env[1648]: time="2024-04-12T18:54:42.428885292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:54:42.886016 kubelet[2657]: I0412 18:54:42.885978 2657 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:54:42.948837 env[1648]: time="2024-04-12T18:54:42.948796443Z" level=info msg="StopPodSandbox for \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\"" Apr 12 18:54:42.950043 env[1648]: time="2024-04-12T18:54:42.948909387Z" level=info msg="StopPodSandbox for \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\"" Apr 12 18:54:43.041851 systemd-networkd[1460]: cali093dd2849d9: Gained IPv6LL Apr 12 18:54:43.312094 systemd[1]: run-containerd-runc-k8s.io-fee77324393c6b7e003d12b4bd3e3d4ad19587e4fe5261213f8185b55907a21d-runc.6Y9a6h.mount: Deactivated successfully. Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.183 [INFO][4405] k8s.go 585: Cleaning up netns ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.183 [INFO][4405] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" iface="eth0" netns="/var/run/netns/cni-910cfdca-bb30-a7de-5939-690cf27c668c" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.184 [INFO][4405] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" iface="eth0" netns="/var/run/netns/cni-910cfdca-bb30-a7de-5939-690cf27c668c" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.184 [INFO][4405] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" iface="eth0" netns="/var/run/netns/cni-910cfdca-bb30-a7de-5939-690cf27c668c" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.184 [INFO][4405] k8s.go 592: Releasing IP address(es) ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.184 [INFO][4405] utils.go 188: Calico CNI releasing IP address ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.252 [INFO][4426] ipam_plugin.go 415: Releasing address using handleID ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.252 [INFO][4426] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.252 [INFO][4426] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.301 [WARNING][4426] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.301 [INFO][4426] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.346 [INFO][4426] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:43.350721 env[1648]: 2024-04-12 18:54:43.348 [INFO][4405] k8s.go 598: Teardown processing complete. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:43.354688 systemd[1]: run-netns-cni\x2d910cfdca\x2dbb30\x2da7de\x2d5939\x2d690cf27c668c.mount: Deactivated successfully. Apr 12 18:54:43.355409 env[1648]: time="2024-04-12T18:54:43.355349324Z" level=info msg="TearDown network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\" successfully" Apr 12 18:54:43.355505 env[1648]: time="2024-04-12T18:54:43.355487764Z" level=info msg="StopPodSandbox for \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\" returns successfully" Apr 12 18:54:43.356425 env[1648]: time="2024-04-12T18:54:43.356335293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-555bc98ffc-2988q,Uid:018f23ab-cb55-41c2-bf3e-4d8ab8732669,Namespace:calico-system,Attempt:1,}" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.360 [INFO][4413] k8s.go 585: Cleaning up netns ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.360 [INFO][4413] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" iface="eth0" netns="/var/run/netns/cni-8d9bdae0-0d1f-6f35-d093-cb2c0581438e" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.360 [INFO][4413] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" iface="eth0" netns="/var/run/netns/cni-8d9bdae0-0d1f-6f35-d093-cb2c0581438e" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.360 [INFO][4413] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" iface="eth0" netns="/var/run/netns/cni-8d9bdae0-0d1f-6f35-d093-cb2c0581438e" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.360 [INFO][4413] k8s.go 592: Releasing IP address(es) ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.360 [INFO][4413] utils.go 188: Calico CNI releasing IP address ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.467 [INFO][4451] ipam_plugin.go 415: Releasing address using handleID ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.468 [INFO][4451] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.468 [INFO][4451] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.503 [WARNING][4451] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.503 [INFO][4451] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.506 [INFO][4451] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:43.513586 env[1648]: 2024-04-12 18:54:43.508 [INFO][4413] k8s.go 598: Teardown processing complete. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:43.516897 systemd[1]: run-netns-cni\x2d8d9bdae0\x2d0d1f\x2d6f35\x2dd093\x2dcb2c0581438e.mount: Deactivated successfully. Apr 12 18:54:43.518331 env[1648]: time="2024-04-12T18:54:43.518266798Z" level=info msg="TearDown network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\" successfully" Apr 12 18:54:43.518331 env[1648]: time="2024-04-12T18:54:43.518319129Z" level=info msg="StopPodSandbox for \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\" returns successfully" Apr 12 18:54:43.519166 env[1648]: time="2024-04-12T18:54:43.519136597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-zb92d,Uid:9360f804-7614-4887-b5a4-78096088bf28,Namespace:kube-system,Attempt:1,}" Apr 12 18:54:43.559000 audit[4474]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:43.559000 audit[4474]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc5a49b3a0 a2=0 a3=7ffc5a49b38c items=0 ppid=3054 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:43.561000 audit[4474]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:43.561000 audit[4474]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc5a49b3a0 a2=0 a3=7ffc5a49b38c items=0 ppid=3054 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:43.685902 systemd-networkd[1460]: cali5216b809772: Link UP Apr 12 18:54:43.691385 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:54:43.691554 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5216b809772: link becomes ready Apr 12 18:54:43.691730 systemd-networkd[1460]: cali5216b809772: Gained carrier Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.511 [INFO][4455] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0 calico-kube-controllers-555bc98ffc- calico-system 018f23ab-cb55-41c2-bf3e-4d8ab8732669 694 0 2024-04-12 18:54:17 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:555bc98ffc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-22-226 calico-kube-controllers-555bc98ffc-2988q eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5216b809772 [] []}} ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Namespace="calico-system" Pod="calico-kube-controllers-555bc98ffc-2988q" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.512 [INFO][4455] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Namespace="calico-system" Pod="calico-kube-controllers-555bc98ffc-2988q" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.615 [INFO][4470] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" HandleID="k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.630 [INFO][4470] ipam_plugin.go 268: Auto assigning IP ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" HandleID="k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281400), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-22-226", "pod":"calico-kube-controllers-555bc98ffc-2988q", "timestamp":"2024-04-12 18:54:43.615441938 +0000 UTC"}, Hostname:"ip-172-31-22-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.630 [INFO][4470] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.630 [INFO][4470] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.630 [INFO][4470] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-22-226' Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.635 [INFO][4470] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.640 [INFO][4470] ipam.go 372: Looking up existing affinities for host host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.647 [INFO][4470] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.650 [INFO][4470] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.653 [INFO][4470] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.653 [INFO][4470] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.657 [INFO][4470] ipam.go 1682: Creating new handle: k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270 Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.663 [INFO][4470] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.673 [INFO][4470] ipam.go 1216: Successfully claimed IPs: [192.168.32.3/26] block=192.168.32.0/26 handle="k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.673 [INFO][4470] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.3/26] handle="k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" host="ip-172-31-22-226" Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.673 [INFO][4470] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:43.720384 env[1648]: 2024-04-12 18:54:43.674 [INFO][4470] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.32.3/26] IPv6=[] ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" HandleID="k8s-pod-network.e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.722485 env[1648]: 2024-04-12 18:54:43.679 [INFO][4455] k8s.go 385: Populated endpoint ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Namespace="calico-system" Pod="calico-kube-controllers-555bc98ffc-2988q" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0", GenerateName:"calico-kube-controllers-555bc98ffc-", Namespace:"calico-system", SelfLink:"", UID:"018f23ab-cb55-41c2-bf3e-4d8ab8732669", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"555bc98ffc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"", Pod:"calico-kube-controllers-555bc98ffc-2988q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5216b809772", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:43.722485 env[1648]: 2024-04-12 18:54:43.679 [INFO][4455] k8s.go 386: Calico CNI using IPs: [192.168.32.3/32] ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Namespace="calico-system" Pod="calico-kube-controllers-555bc98ffc-2988q" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.722485 env[1648]: 2024-04-12 18:54:43.679 [INFO][4455] dataplane_linux.go 68: Setting the host side veth name to cali5216b809772 ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Namespace="calico-system" Pod="calico-kube-controllers-555bc98ffc-2988q" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.722485 env[1648]: 2024-04-12 18:54:43.693 [INFO][4455] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Namespace="calico-system" Pod="calico-kube-controllers-555bc98ffc-2988q" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.722485 env[1648]: 2024-04-12 18:54:43.693 [INFO][4455] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Namespace="calico-system" Pod="calico-kube-controllers-555bc98ffc-2988q" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0", GenerateName:"calico-kube-controllers-555bc98ffc-", Namespace:"calico-system", SelfLink:"", UID:"018f23ab-cb55-41c2-bf3e-4d8ab8732669", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"555bc98ffc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270", Pod:"calico-kube-controllers-555bc98ffc-2988q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5216b809772", MAC:"26:69:97:26:62:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:43.722485 env[1648]: 2024-04-12 18:54:43.710 [INFO][4455] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270" Namespace="calico-system" Pod="calico-kube-controllers-555bc98ffc-2988q" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:43.754000 audit[4509]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4509 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:43.754000 audit[4509]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffe60a9ad60 a2=0 a3=7ffe60a9ad4c items=0 ppid=3931 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.754000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:43.806004 env[1648]: time="2024-04-12T18:54:43.805852300Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:43.806290 env[1648]: time="2024-04-12T18:54:43.806028120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:43.806290 env[1648]: time="2024-04-12T18:54:43.806062949Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:43.807479 env[1648]: time="2024-04-12T18:54:43.806336025Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270 pid=4522 runtime=io.containerd.runc.v2 Apr 12 18:54:43.859456 systemd-networkd[1460]: calicb4ddad6505: Link UP Apr 12 18:54:43.865898 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicb4ddad6505: link becomes ready Apr 12 18:54:43.866275 systemd-networkd[1460]: calicb4ddad6505: Gained carrier Apr 12 18:54:43.869251 systemd[1]: Started cri-containerd-e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270.scope. Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.643 [INFO][4475] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0 coredns-76f75df574- kube-system 9360f804-7614-4887-b5a4-78096088bf28 702 0 2024-04-12 18:54:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-22-226 coredns-76f75df574-zb92d eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calicb4ddad6505 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Namespace="kube-system" Pod="coredns-76f75df574-zb92d" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.643 [INFO][4475] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Namespace="kube-system" Pod="coredns-76f75df574-zb92d" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.768 [INFO][4492] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" HandleID="k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.789 [INFO][4492] ipam_plugin.go 268: Auto assigning IP ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" HandleID="k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000260c00), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-22-226", "pod":"coredns-76f75df574-zb92d", "timestamp":"2024-04-12 18:54:43.768895672 +0000 UTC"}, Hostname:"ip-172-31-22-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.789 [INFO][4492] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.789 [INFO][4492] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.790 [INFO][4492] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-22-226' Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.793 [INFO][4492] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.801 [INFO][4492] ipam.go 372: Looking up existing affinities for host host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.807 [INFO][4492] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.810 [INFO][4492] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.813 [INFO][4492] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.813 [INFO][4492] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.819 [INFO][4492] ipam.go 1682: Creating new handle: k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.825 [INFO][4492] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.837 [INFO][4492] ipam.go 1216: Successfully claimed IPs: [192.168.32.4/26] block=192.168.32.0/26 handle="k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.837 [INFO][4492] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.4/26] handle="k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" host="ip-172-31-22-226" Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.837 [INFO][4492] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:43.887653 env[1648]: 2024-04-12 18:54:43.837 [INFO][4492] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.32.4/26] IPv6=[] ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" HandleID="k8s-pod-network.ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.889043 env[1648]: 2024-04-12 18:54:43.840 [INFO][4475] k8s.go 385: Populated endpoint ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Namespace="kube-system" Pod="coredns-76f75df574-zb92d" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9360f804-7614-4887-b5a4-78096088bf28", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"", Pod:"coredns-76f75df574-zb92d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicb4ddad6505", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:43.889043 env[1648]: 2024-04-12 18:54:43.840 [INFO][4475] k8s.go 386: Calico CNI using IPs: [192.168.32.4/32] ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Namespace="kube-system" Pod="coredns-76f75df574-zb92d" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.889043 env[1648]: 2024-04-12 18:54:43.840 [INFO][4475] dataplane_linux.go 68: Setting the host side veth name to calicb4ddad6505 ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Namespace="kube-system" Pod="coredns-76f75df574-zb92d" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.889043 env[1648]: 2024-04-12 18:54:43.867 [INFO][4475] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Namespace="kube-system" Pod="coredns-76f75df574-zb92d" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.889043 env[1648]: 2024-04-12 18:54:43.868 [INFO][4475] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Namespace="kube-system" Pod="coredns-76f75df574-zb92d" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9360f804-7614-4887-b5a4-78096088bf28", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e", Pod:"coredns-76f75df574-zb92d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicb4ddad6505", MAC:"b6:8d:dc:47:e3:29", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:43.889043 env[1648]: 2024-04-12 18:54:43.881 [INFO][4475] k8s.go 498: Wrote updated endpoint to datastore ContainerID="ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e" Namespace="kube-system" Pod="coredns-76f75df574-zb92d" WorkloadEndpoint="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.933000 audit: BPF prog-id=173 op=LOAD Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4522 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539373235626461386665383937343932343137663732633136356465 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4522 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539373235626461386665383937343932343137663732633136356465 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.934000 audit: BPF prog-id=174 op=LOAD Apr 12 18:54:43.934000 audit[4532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000301050 items=0 ppid=4522 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539373235626461386665383937343932343137663732633136356465 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.935000 audit: BPF prog-id=175 op=LOAD Apr 12 18:54:43.935000 audit[4532]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000301098 items=0 ppid=4522 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539373235626461386665383937343932343137663732633136356465 Apr 12 18:54:43.936000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:54:43.936000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:43.936000 audit: BPF prog-id=176 op=LOAD Apr 12 18:54:43.936000 audit[4532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003014a8 items=0 ppid=4522 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.939675 systemd-networkd[1460]: calida62161cbac: Gained IPv6LL Apr 12 18:54:43.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539373235626461386665383937343932343137663732633136356465 Apr 12 18:54:43.967478 env[1648]: time="2024-04-12T18:54:43.960691314Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:43.967478 env[1648]: time="2024-04-12T18:54:43.960808433Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:43.967478 env[1648]: time="2024-04-12T18:54:43.960826570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:43.967478 env[1648]: time="2024-04-12T18:54:43.961085731Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e pid=4571 runtime=io.containerd.runc.v2 Apr 12 18:54:43.991000 audit[4563]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4563 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:43.991000 audit[4563]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7fff8c4056b0 a2=0 a3=7fff8c40569c items=0 ppid=3931 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:43.991000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:44.074358 systemd[1]: Started cri-containerd-ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e.scope. Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.106000 audit: BPF prog-id=177 op=LOAD Apr 12 18:54:44.107000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.107000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4571 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313261333061643137643737646136366362366563306464656362 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4571 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313261333061643137643737646136366362366563306464656362 Apr 12 18:54:44.110143 env[1648]: time="2024-04-12T18:54:44.110054427Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-555bc98ffc-2988q,Uid:018f23ab-cb55-41c2-bf3e-4d8ab8732669,Namespace:calico-system,Attempt:1,} returns sandbox id \"e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270\"" Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.108000 audit: BPF prog-id=178 op=LOAD Apr 12 18:54:44.108000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028ef00 items=0 ppid=4571 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313261333061643137643737646136366362366563306464656362 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.110000 audit: BPF prog-id=179 op=LOAD Apr 12 18:54:44.110000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028ef48 items=0 ppid=4571 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313261333061643137643737646136366362366563306464656362 Apr 12 18:54:44.111000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:54:44.111000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.111000 audit: BPF prog-id=180 op=LOAD Apr 12 18:54:44.111000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028f358 items=0 ppid=4571 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313261333061643137643737646136366362366563306464656362 Apr 12 18:54:44.165829 env[1648]: time="2024-04-12T18:54:44.165787269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-zb92d,Uid:9360f804-7614-4887-b5a4-78096088bf28,Namespace:kube-system,Attempt:1,} returns sandbox id \"ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e\"" Apr 12 18:54:44.169132 env[1648]: time="2024-04-12T18:54:44.169095872Z" level=info msg="CreateContainer within sandbox \"ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:54:44.205511 env[1648]: time="2024-04-12T18:54:44.205478366Z" level=info msg="CreateContainer within sandbox \"ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f7cf424de84bf24e5cd5b4bb6c00daa85be99df09cf90a7ce54d6dfb7bc5c24c\"" Apr 12 18:54:44.208614 env[1648]: time="2024-04-12T18:54:44.208579652Z" level=info msg="StartContainer for \"f7cf424de84bf24e5cd5b4bb6c00daa85be99df09cf90a7ce54d6dfb7bc5c24c\"" Apr 12 18:54:44.244575 systemd[1]: Started cri-containerd-f7cf424de84bf24e5cd5b4bb6c00daa85be99df09cf90a7ce54d6dfb7bc5c24c.scope. Apr 12 18:54:44.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.266000 audit: BPF prog-id=181 op=LOAD Apr 12 18:54:44.267000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.267000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4571 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636634323464653834626632346535636435623462623663303064 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4571 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636634323464653834626632346535636435623462623663303064 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit: BPF prog-id=182 op=LOAD Apr 12 18:54:44.268000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024cae0 items=0 ppid=4571 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636634323464653834626632346535636435623462623663303064 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.268000 audit: BPF prog-id=183 op=LOAD Apr 12 18:54:44.268000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024cb28 items=0 ppid=4571 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636634323464653834626632346535636435623462623663303064 Apr 12 18:54:44.268000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:54:44.270000 audit: BPF prog-id=182 op=UNLOAD Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.270000 audit: BPF prog-id=184 op=LOAD Apr 12 18:54:44.270000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024cf38 items=0 ppid=4571 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636634323464653834626632346535636435623462623663303064 Apr 12 18:54:44.296473 env[1648]: time="2024-04-12T18:54:44.296271458Z" level=info msg="StartContainer for \"f7cf424de84bf24e5cd5b4bb6c00daa85be99df09cf90a7ce54d6dfb7bc5c24c\" returns successfully" Apr 12 18:54:44.425697 env[1648]: time="2024-04-12T18:54:44.425590280Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:44.428943 env[1648]: time="2024-04-12T18:54:44.428898483Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:44.431622 env[1648]: time="2024-04-12T18:54:44.431585306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:44.434093 env[1648]: time="2024-04-12T18:54:44.434062101Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:44.434618 env[1648]: time="2024-04-12T18:54:44.434588534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:54:44.437698 env[1648]: time="2024-04-12T18:54:44.436740402Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:54:44.440269 env[1648]: time="2024-04-12T18:54:44.440223677Z" level=info msg="CreateContainer within sandbox \"b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:54:44.460317 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2926320627.mount: Deactivated successfully. Apr 12 18:54:44.478522 env[1648]: time="2024-04-12T18:54:44.478472299Z" level=info msg="CreateContainer within sandbox \"b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8dd93b7ff8d9ef118eddcb527850e54893304b2b9f9bfc06843fd0e65fb7815d\"" Apr 12 18:54:44.480722 env[1648]: time="2024-04-12T18:54:44.479213757Z" level=info msg="StartContainer for \"8dd93b7ff8d9ef118eddcb527850e54893304b2b9f9bfc06843fd0e65fb7815d\"" Apr 12 18:54:44.517296 systemd[1]: Started cri-containerd-8dd93b7ff8d9ef118eddcb527850e54893304b2b9f9bfc06843fd0e65fb7815d.scope. Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7fe4d4bb4bd8 items=0 ppid=4322 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643933623766663864396566313138656464636235323738353065 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit: BPF prog-id=185 op=LOAD Apr 12 18:54:44.538000 audit[4655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c0000a0208 items=0 ppid=4322 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643933623766663864396566313138656464636235323738353065 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit: BPF prog-id=186 op=LOAD Apr 12 18:54:44.538000 audit[4655]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c0000a0258 items=0 ppid=4322 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643933623766663864396566313138656464636235323738353065 Apr 12 18:54:44.538000 audit: BPF prog-id=186 op=UNLOAD Apr 12 18:54:44.538000 audit: BPF prog-id=185 op=UNLOAD Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { perfmon } for pid=4655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit[4655]: AVC avc: denied { bpf } for pid=4655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:44.538000 audit: BPF prog-id=187 op=LOAD Apr 12 18:54:44.538000 audit[4655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c0000a02e8 items=0 ppid=4322 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:44.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643933623766663864396566313138656464636235323738353065 Apr 12 18:54:44.556606 env[1648]: time="2024-04-12T18:54:44.556534046Z" level=info msg="StartContainer for \"8dd93b7ff8d9ef118eddcb527850e54893304b2b9f9bfc06843fd0e65fb7815d\" returns successfully" Apr 12 18:54:45.026600 systemd-networkd[1460]: calicb4ddad6505: Gained IPv6LL Apr 12 18:54:45.234620 kubelet[2657]: I0412 18:54:45.234585 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-zb92d" podStartSLOduration=34.234533381 podStartE2EDuration="34.234533381s" podCreationTimestamp="2024-04-12 18:54:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:54:45.220135091 +0000 UTC m=+48.468609635" watchObservedRunningTime="2024-04-12 18:54:45.234533381 +0000 UTC m=+48.483007924" Apr 12 18:54:45.238000 audit[4681]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4681 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:45.238000 audit[4681]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdae2ff5e0 a2=0 a3=7ffdae2ff5cc items=0 ppid=3054 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:45.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:45.240000 audit[4681]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4681 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:45.240000 audit[4681]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdae2ff5e0 a2=0 a3=7ffdae2ff5cc items=0 ppid=3054 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:45.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:45.251000 audit[4683]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:45.251000 audit[4683]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe9ea11b90 a2=0 a3=7ffe9ea11b7c items=0 ppid=3054 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:45.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:45.265000 audit[4683]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:45.265000 audit[4683]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe9ea11b90 a2=0 a3=7ffe9ea11b7c items=0 ppid=3054 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:45.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:45.312325 systemd[1]: run-containerd-runc-k8s.io-8dd93b7ff8d9ef118eddcb527850e54893304b2b9f9bfc06843fd0e65fb7815d-runc.gnbLad.mount: Deactivated successfully. Apr 12 18:54:45.410540 systemd-networkd[1460]: cali5216b809772: Gained IPv6LL Apr 12 18:54:46.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.226:22-147.75.109.163:47284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:46.353339 systemd[1]: Started sshd@7-172.31.22.226:22-147.75.109.163:47284.service. Apr 12 18:54:46.587000 audit[4695]: USER_ACCT pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:46.589648 sshd[4695]: Accepted publickey for core from 147.75.109.163 port 47284 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:54:46.590899 kernel: kauditd_printk_skb: 412 callbacks suppressed Apr 12 18:54:46.591039 kernel: audit: type=1101 audit(1712948086.587:1347): pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:46.612048 kernel: audit: type=1103 audit(1712948086.598:1348): pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:46.598000 audit[4695]: CRED_ACQ pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:46.598000 audit[4695]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff71d9f970 a2=3 a3=0 items=0 ppid=1 pid=4695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:46.625602 kernel: audit: type=1006 audit(1712948086.598:1349): pid=4695 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Apr 12 18:54:46.625672 kernel: audit: type=1300 audit(1712948086.598:1349): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff71d9f970 a2=3 a3=0 items=0 ppid=1 pid=4695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:46.626178 sshd[4695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:46.598000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:46.631457 kernel: audit: type=1327 audit(1712948086.598:1349): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:46.636714 systemd-logind[1633]: New session 8 of user core. Apr 12 18:54:46.637396 systemd[1]: Started session-8.scope. Apr 12 18:54:46.644000 audit[4695]: USER_START pid=4695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:46.655407 kernel: audit: type=1105 audit(1712948086.644:1350): pid=4695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:46.647000 audit[4703]: CRED_ACQ pid=4703 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:46.665413 kernel: audit: type=1103 audit(1712948086.647:1351): pid=4703 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:47.246015 sshd[4695]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:47.246000 audit[4695]: USER_END pid=4695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:47.249593 systemd[1]: sshd@7-172.31.22.226:22-147.75.109.163:47284.service: Deactivated successfully. Apr 12 18:54:47.251057 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:54:47.254246 systemd-logind[1633]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:54:47.256872 systemd-logind[1633]: Removed session 8. Apr 12 18:54:47.257452 kernel: audit: type=1106 audit(1712948087.246:1352): pid=4695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:47.246000 audit[4695]: CRED_DISP pid=4695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:47.268416 kernel: audit: type=1104 audit(1712948087.246:1353): pid=4695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:47.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.226:22-147.75.109.163:47284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:47.284412 kernel: audit: type=1131 audit(1712948087.248:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.226:22-147.75.109.163:47284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:47.445283 env[1648]: time="2024-04-12T18:54:47.445247367Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:47.449019 env[1648]: time="2024-04-12T18:54:47.448981523Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:47.457212 env[1648]: time="2024-04-12T18:54:47.457172939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:47.461348 env[1648]: time="2024-04-12T18:54:47.461311316Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:47.462711 env[1648]: time="2024-04-12T18:54:47.462664952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 18:54:47.464379 env[1648]: time="2024-04-12T18:54:47.464333795Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:54:47.489914 env[1648]: time="2024-04-12T18:54:47.489866355Z" level=info msg="CreateContainer within sandbox \"e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:54:47.518156 env[1648]: time="2024-04-12T18:54:47.518042755Z" level=info msg="CreateContainer within sandbox \"e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a1eebd863ea2942fa37eb591e7dbc5f242376acf1a2c9a4ae7c2f08afc3b84a2\"" Apr 12 18:54:47.518903 env[1648]: time="2024-04-12T18:54:47.518872373Z" level=info msg="StartContainer for \"a1eebd863ea2942fa37eb591e7dbc5f242376acf1a2c9a4ae7c2f08afc3b84a2\"" Apr 12 18:54:47.564507 systemd[1]: Started cri-containerd-a1eebd863ea2942fa37eb591e7dbc5f242376acf1a2c9a4ae7c2f08afc3b84a2.scope. Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.607000 audit: BPF prog-id=188 op=LOAD Apr 12 18:54:47.608000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.608000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4522 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:47.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656562643836336561323934326661333765623539316537646263 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4522 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:47.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656562643836336561323934326661333765623539316537646263 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.609000 audit: BPF prog-id=189 op=LOAD Apr 12 18:54:47.609000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000374230 items=0 ppid=4522 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:47.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656562643836336561323934326661333765623539316537646263 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.610000 audit: BPF prog-id=190 op=LOAD Apr 12 18:54:47.610000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000374278 items=0 ppid=4522 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:47.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656562643836336561323934326661333765623539316537646263 Apr 12 18:54:47.611000 audit: BPF prog-id=190 op=UNLOAD Apr 12 18:54:47.611000 audit: BPF prog-id=189 op=UNLOAD Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:47.611000 audit: BPF prog-id=191 op=LOAD Apr 12 18:54:47.611000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000374688 items=0 ppid=4522 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:47.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656562643836336561323934326661333765623539316537646263 Apr 12 18:54:47.671657 env[1648]: time="2024-04-12T18:54:47.671612957Z" level=info msg="StartContainer for \"a1eebd863ea2942fa37eb591e7dbc5f242376acf1a2c9a4ae7c2f08afc3b84a2\" returns successfully" Apr 12 18:54:48.322662 kubelet[2657]: I0412 18:54:48.322618 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-555bc98ffc-2988q" podStartSLOduration=27.978784828 podStartE2EDuration="31.322549049s" podCreationTimestamp="2024-04-12 18:54:17 +0000 UTC" firstStartedPulling="2024-04-12 18:54:44.120307285 +0000 UTC m=+47.368781815" lastFinishedPulling="2024-04-12 18:54:47.46407151 +0000 UTC m=+50.712546036" observedRunningTime="2024-04-12 18:54:48.242513769 +0000 UTC m=+51.490988313" watchObservedRunningTime="2024-04-12 18:54:48.322549049 +0000 UTC m=+51.571023595" Apr 12 18:54:49.026479 env[1648]: time="2024-04-12T18:54:49.026436743Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:49.030236 env[1648]: time="2024-04-12T18:54:49.030195782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:49.032542 env[1648]: time="2024-04-12T18:54:49.032505624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:49.034820 env[1648]: time="2024-04-12T18:54:49.034784301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:49.035150 env[1648]: time="2024-04-12T18:54:49.035115193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:54:49.037843 env[1648]: time="2024-04-12T18:54:49.037813068Z" level=info msg="CreateContainer within sandbox \"b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:54:49.062340 env[1648]: time="2024-04-12T18:54:49.062297436Z" level=info msg="CreateContainer within sandbox \"b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"7876cd08b0f35a3a9576f04621c38a2b5ef365272e1e36a2d698faf0be007829\"" Apr 12 18:54:49.063308 env[1648]: time="2024-04-12T18:54:49.063278098Z" level=info msg="StartContainer for \"7876cd08b0f35a3a9576f04621c38a2b5ef365272e1e36a2d698faf0be007829\"" Apr 12 18:54:49.109443 systemd[1]: run-containerd-runc-k8s.io-7876cd08b0f35a3a9576f04621c38a2b5ef365272e1e36a2d698faf0be007829-runc.OkFCe7.mount: Deactivated successfully. Apr 12 18:54:49.117355 systemd[1]: Started cri-containerd-7876cd08b0f35a3a9576f04621c38a2b5ef365272e1e36a2d698faf0be007829.scope. Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1705e99bd8 items=0 ppid=4322 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:49.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738373663643038623066333561336139353736663034363231633338 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit: BPF prog-id=192 op=LOAD Apr 12 18:54:49.135000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0948 items=0 ppid=4322 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:49.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738373663643038623066333561336139353736663034363231633338 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit: BPF prog-id=193 op=LOAD Apr 12 18:54:49.135000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0998 items=0 ppid=4322 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:49.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738373663643038623066333561336139353736663034363231633338 Apr 12 18:54:49.135000 audit: BPF prog-id=193 op=UNLOAD Apr 12 18:54:49.135000 audit: BPF prog-id=192 op=UNLOAD Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:49.135000 audit: BPF prog-id=194 op=LOAD Apr 12 18:54:49.135000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0a28 items=0 ppid=4322 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:49.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738373663643038623066333561336139353736663034363231633338 Apr 12 18:54:49.160418 env[1648]: time="2024-04-12T18:54:49.160345288Z" level=info msg="StartContainer for \"7876cd08b0f35a3a9576f04621c38a2b5ef365272e1e36a2d698faf0be007829\" returns successfully" Apr 12 18:54:50.129900 kubelet[2657]: I0412 18:54:50.129868 2657 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:54:50.131103 kubelet[2657]: I0412 18:54:50.131083 2657 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:54:52.274031 systemd[1]: Started sshd@8-172.31.22.226:22-147.75.109.163:43024.service. Apr 12 18:54:52.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.226:22-147.75.109.163:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:52.277854 kernel: kauditd_printk_skb: 100 callbacks suppressed Apr 12 18:54:52.277961 kernel: audit: type=1130 audit(1712948092.272:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.226:22-147.75.109.163:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:52.398000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:52.398000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:52.414696 kernel: audit: type=1400 audit(1712948092.398:1380): avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:52.414834 kernel: audit: type=1400 audit(1712948092.398:1381): avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:52.398000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a3500 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:52.398000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:52.435050 kernel: audit: type=1300 audit(1712948092.398:1381): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a3500 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:52.435173 kernel: audit: type=1327 audit(1712948092.398:1381): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:52.435403 kernel: audit: type=1300 audit(1712948092.398:1380): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ca6f30 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:52.398000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ca6f30 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:54:52.398000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:52.453421 kernel: audit: type=1327 audit(1712948092.398:1380): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:52.500000 audit[4810]: USER_ACCT pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:52.503457 sshd[4810]: Accepted publickey for core from 147.75.109.163 port 43024 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:54:52.510401 kernel: audit: type=1101 audit(1712948092.500:1382): pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:52.508000 audit[4810]: CRED_ACQ pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:52.513190 sshd[4810]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:52.523221 kernel: audit: type=1103 audit(1712948092.508:1383): pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:52.523347 kernel: audit: type=1006 audit(1712948092.509:1384): pid=4810 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 18:54:52.509000 audit[4810]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef679b480 a2=3 a3=0 items=0 ppid=1 pid=4810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:52.509000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:52.527591 systemd-logind[1633]: New session 9 of user core. Apr 12 18:54:52.528818 systemd[1]: Started session-9.scope. Apr 12 18:54:52.533000 audit[4810]: USER_START pid=4810 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:52.534000 audit[4812]: CRED_ACQ pid=4812 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:52.842903 sshd[4810]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:52.843000 audit[4810]: USER_END pid=4810 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:52.843000 audit[4810]: CRED_DISP pid=4810 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:52.846945 systemd-logind[1633]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:54:52.847193 systemd[1]: sshd@8-172.31.22.226:22-147.75.109.163:43024.service: Deactivated successfully. Apr 12 18:54:52.848150 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:54:52.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.226:22-147.75.109.163:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:52.849322 systemd-logind[1633]: Removed session 9. Apr 12 18:54:53.326000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520983 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:53.326000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:53.326000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00c2899e0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:54:53.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:54:53.326000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00d2ec930 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:54:53.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:54:53.331000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:53.331000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0026ad7c0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:54:53.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:54:53.364000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:53.364000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00168c1a0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:54:53.364000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:54:53.365000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:53.365000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00d2eff80 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:54:53.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:54:53.441000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:53.441000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ba58990 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:54:53.441000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:54:56.912322 env[1648]: time="2024-04-12T18:54:56.912267670Z" level=info msg="StopPodSandbox for \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\"" Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:56.978 [WARNING][4843] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6bafbd32-21fe-46f8-9db9-21478e19beab", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67", Pod:"csi-node-driver-nzrsx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calida62161cbac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:56.979 [INFO][4843] k8s.go 585: Cleaning up netns ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:56.979 [INFO][4843] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" iface="eth0" netns="" Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:56.979 [INFO][4843] k8s.go 592: Releasing IP address(es) ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:56.979 [INFO][4843] utils.go 188: Calico CNI releasing IP address ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:57.018 [INFO][4851] ipam_plugin.go 415: Releasing address using handleID ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:57.019 [INFO][4851] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:57.019 [INFO][4851] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:57.025 [WARNING][4851] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:57.025 [INFO][4851] ipam_plugin.go 443: Releasing address using workloadID ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:57.027 [INFO][4851] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:57.031711 env[1648]: 2024-04-12 18:54:57.029 [INFO][4843] k8s.go 598: Teardown processing complete. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:57.033555 env[1648]: time="2024-04-12T18:54:57.031737540Z" level=info msg="TearDown network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\" successfully" Apr 12 18:54:57.033555 env[1648]: time="2024-04-12T18:54:57.031774132Z" level=info msg="StopPodSandbox for \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\" returns successfully" Apr 12 18:54:57.033555 env[1648]: time="2024-04-12T18:54:57.033028550Z" level=info msg="RemovePodSandbox for \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\"" Apr 12 18:54:57.033555 env[1648]: time="2024-04-12T18:54:57.033149878Z" level=info msg="Forcibly stopping sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\"" Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.078 [WARNING][4872] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6bafbd32-21fe-46f8-9db9-21478e19beab", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"b2d4266b08c36c44cfdefd27f97195ac265eb4696ce6839f09c81567c9eb0d67", Pod:"csi-node-driver-nzrsx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calida62161cbac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.079 [INFO][4872] k8s.go 585: Cleaning up netns ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.079 [INFO][4872] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" iface="eth0" netns="" Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.079 [INFO][4872] k8s.go 592: Releasing IP address(es) ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.079 [INFO][4872] utils.go 188: Calico CNI releasing IP address ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.108 [INFO][4878] ipam_plugin.go 415: Releasing address using handleID ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.108 [INFO][4878] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.109 [INFO][4878] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.116 [WARNING][4878] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.116 [INFO][4878] ipam_plugin.go 443: Releasing address using workloadID ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" HandleID="k8s-pod-network.08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Workload="ip--172--31--22--226-k8s-csi--node--driver--nzrsx-eth0" Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.118 [INFO][4878] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:57.125383 env[1648]: 2024-04-12 18:54:57.121 [INFO][4872] k8s.go 598: Teardown processing complete. ContainerID="08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c" Apr 12 18:54:57.128430 env[1648]: time="2024-04-12T18:54:57.125458405Z" level=info msg="TearDown network for sandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\" successfully" Apr 12 18:54:57.132358 env[1648]: time="2024-04-12T18:54:57.132315349Z" level=info msg="RemovePodSandbox \"08bffa247d2c24d4dc0b065280c492a81198df5b4f00ffcc7a8ce1efd09e6c1c\" returns successfully" Apr 12 18:54:57.133019 env[1648]: time="2024-04-12T18:54:57.132986640Z" level=info msg="StopPodSandbox for \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\"" Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.181 [WARNING][4898] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3ac62c03-6eaf-4fa2-aa3a-232c595f0993", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2", Pod:"coredns-76f75df574-tvfh2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali093dd2849d9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.181 [INFO][4898] k8s.go 585: Cleaning up netns ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.181 [INFO][4898] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" iface="eth0" netns="" Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.181 [INFO][4898] k8s.go 592: Releasing IP address(es) ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.181 [INFO][4898] utils.go 188: Calico CNI releasing IP address ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.207 [INFO][4904] ipam_plugin.go 415: Releasing address using handleID ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.207 [INFO][4904] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.208 [INFO][4904] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.215 [WARNING][4904] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.215 [INFO][4904] ipam_plugin.go 443: Releasing address using workloadID ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.217 [INFO][4904] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:57.221241 env[1648]: 2024-04-12 18:54:57.219 [INFO][4898] k8s.go 598: Teardown processing complete. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:57.221890 env[1648]: time="2024-04-12T18:54:57.221424298Z" level=info msg="TearDown network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\" successfully" Apr 12 18:54:57.221890 env[1648]: time="2024-04-12T18:54:57.221462984Z" level=info msg="StopPodSandbox for \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\" returns successfully" Apr 12 18:54:57.222441 env[1648]: time="2024-04-12T18:54:57.222409907Z" level=info msg="RemovePodSandbox for \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\"" Apr 12 18:54:57.222559 env[1648]: time="2024-04-12T18:54:57.222445094Z" level=info msg="Forcibly stopping sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\"" Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.267 [WARNING][4924] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3ac62c03-6eaf-4fa2-aa3a-232c595f0993", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"5ccaf5f2dd04ec258ef9cc0bd1d996a3e2e68e2095a691f4f0a42346249addc2", Pod:"coredns-76f75df574-tvfh2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali093dd2849d9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.267 [INFO][4924] k8s.go 585: Cleaning up netns ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.267 [INFO][4924] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" iface="eth0" netns="" Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.267 [INFO][4924] k8s.go 592: Releasing IP address(es) ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.267 [INFO][4924] utils.go 188: Calico CNI releasing IP address ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.298 [INFO][4930] ipam_plugin.go 415: Releasing address using handleID ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.298 [INFO][4930] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.299 [INFO][4930] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.308 [WARNING][4930] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.308 [INFO][4930] ipam_plugin.go 443: Releasing address using workloadID ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" HandleID="k8s-pod-network.288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--tvfh2-eth0" Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.310 [INFO][4930] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:57.314856 env[1648]: 2024-04-12 18:54:57.312 [INFO][4924] k8s.go 598: Teardown processing complete. ContainerID="288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147" Apr 12 18:54:57.315953 env[1648]: time="2024-04-12T18:54:57.314881681Z" level=info msg="TearDown network for sandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\" successfully" Apr 12 18:54:57.320741 env[1648]: time="2024-04-12T18:54:57.320666011Z" level=info msg="RemovePodSandbox \"288af1539b01183b947a47e9d3790445275372e7819593e5bf001ca304768147\" returns successfully" Apr 12 18:54:57.321871 env[1648]: time="2024-04-12T18:54:57.321830879Z" level=info msg="StopPodSandbox for \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\"" Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.375 [WARNING][4954] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9360f804-7614-4887-b5a4-78096088bf28", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e", Pod:"coredns-76f75df574-zb92d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicb4ddad6505", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.375 [INFO][4954] k8s.go 585: Cleaning up netns ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.375 [INFO][4954] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" iface="eth0" netns="" Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.376 [INFO][4954] k8s.go 592: Releasing IP address(es) ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.376 [INFO][4954] utils.go 188: Calico CNI releasing IP address ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.406 [INFO][4960] ipam_plugin.go 415: Releasing address using handleID ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.407 [INFO][4960] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.407 [INFO][4960] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.414 [WARNING][4960] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.414 [INFO][4960] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.416 [INFO][4960] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:57.420613 env[1648]: 2024-04-12 18:54:57.418 [INFO][4954] k8s.go 598: Teardown processing complete. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:57.421423 env[1648]: time="2024-04-12T18:54:57.421317152Z" level=info msg="TearDown network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\" successfully" Apr 12 18:54:57.421423 env[1648]: time="2024-04-12T18:54:57.421420603Z" level=info msg="StopPodSandbox for \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\" returns successfully" Apr 12 18:54:57.422145 env[1648]: time="2024-04-12T18:54:57.422110900Z" level=info msg="RemovePodSandbox for \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\"" Apr 12 18:54:57.422316 env[1648]: time="2024-04-12T18:54:57.422148489Z" level=info msg="Forcibly stopping sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\"" Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.520 [WARNING][4978] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9360f804-7614-4887-b5a4-78096088bf28", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"ab12a30ad17d77da66cb6ec0ddecbb29e82cd5582ee1b22af8c9a084831f437e", Pod:"coredns-76f75df574-zb92d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicb4ddad6505", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.520 [INFO][4978] k8s.go 585: Cleaning up netns ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.520 [INFO][4978] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" iface="eth0" netns="" Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.520 [INFO][4978] k8s.go 592: Releasing IP address(es) ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.520 [INFO][4978] utils.go 188: Calico CNI releasing IP address ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.565 [INFO][4985] ipam_plugin.go 415: Releasing address using handleID ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.565 [INFO][4985] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.565 [INFO][4985] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.571 [WARNING][4985] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.571 [INFO][4985] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" HandleID="k8s-pod-network.7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Workload="ip--172--31--22--226-k8s-coredns--76f75df574--zb92d-eth0" Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.576 [INFO][4985] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:57.584415 env[1648]: 2024-04-12 18:54:57.580 [INFO][4978] k8s.go 598: Teardown processing complete. ContainerID="7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a" Apr 12 18:54:57.584415 env[1648]: time="2024-04-12T18:54:57.582037261Z" level=info msg="TearDown network for sandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\" successfully" Apr 12 18:54:57.593855 env[1648]: time="2024-04-12T18:54:57.593781613Z" level=info msg="RemovePodSandbox \"7e4e4cb171b8353023920f9c46ce12282f6ec5d2f6785d30314b310d6d91577a\" returns successfully" Apr 12 18:54:57.594948 env[1648]: time="2024-04-12T18:54:57.594914713Z" level=info msg="StopPodSandbox for \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\"" Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.642 [WARNING][5004] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0", GenerateName:"calico-kube-controllers-555bc98ffc-", Namespace:"calico-system", SelfLink:"", UID:"018f23ab-cb55-41c2-bf3e-4d8ab8732669", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"555bc98ffc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270", Pod:"calico-kube-controllers-555bc98ffc-2988q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5216b809772", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.642 [INFO][5004] k8s.go 585: Cleaning up netns ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.642 [INFO][5004] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" iface="eth0" netns="" Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.642 [INFO][5004] k8s.go 592: Releasing IP address(es) ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.642 [INFO][5004] utils.go 188: Calico CNI releasing IP address ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.668 [INFO][5010] ipam_plugin.go 415: Releasing address using handleID ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.668 [INFO][5010] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.669 [INFO][5010] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.675 [WARNING][5010] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.675 [INFO][5010] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.677 [INFO][5010] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:57.680348 env[1648]: 2024-04-12 18:54:57.678 [INFO][5004] k8s.go 598: Teardown processing complete. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:57.681037 env[1648]: time="2024-04-12T18:54:57.680446221Z" level=info msg="TearDown network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\" successfully" Apr 12 18:54:57.681037 env[1648]: time="2024-04-12T18:54:57.680483364Z" level=info msg="StopPodSandbox for \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\" returns successfully" Apr 12 18:54:57.681306 env[1648]: time="2024-04-12T18:54:57.681274241Z" level=info msg="RemovePodSandbox for \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\"" Apr 12 18:54:57.681475 env[1648]: time="2024-04-12T18:54:57.681429710Z" level=info msg="Forcibly stopping sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\"" Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.719 [WARNING][5031] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0", GenerateName:"calico-kube-controllers-555bc98ffc-", Namespace:"calico-system", SelfLink:"", UID:"018f23ab-cb55-41c2-bf3e-4d8ab8732669", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 54, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"555bc98ffc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"e9725bda8fe897492417f72c165deb29cd68520f9879848c08b1a91cf5a3e270", Pod:"calico-kube-controllers-555bc98ffc-2988q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5216b809772", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.719 [INFO][5031] k8s.go 585: Cleaning up netns ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.719 [INFO][5031] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" iface="eth0" netns="" Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.719 [INFO][5031] k8s.go 592: Releasing IP address(es) ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.719 [INFO][5031] utils.go 188: Calico CNI releasing IP address ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.752 [INFO][5037] ipam_plugin.go 415: Releasing address using handleID ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.752 [INFO][5037] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.752 [INFO][5037] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.759 [WARNING][5037] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.759 [INFO][5037] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" HandleID="k8s-pod-network.3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Workload="ip--172--31--22--226-k8s-calico--kube--controllers--555bc98ffc--2988q-eth0" Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.760 [INFO][5037] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:57.764349 env[1648]: 2024-04-12 18:54:57.762 [INFO][5031] k8s.go 598: Teardown processing complete. ContainerID="3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b" Apr 12 18:54:57.765273 env[1648]: time="2024-04-12T18:54:57.764481609Z" level=info msg="TearDown network for sandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\" successfully" Apr 12 18:54:57.769342 env[1648]: time="2024-04-12T18:54:57.769300962Z" level=info msg="RemovePodSandbox \"3f460c2a0c954035428c94839557ce10ab650ef3223f1591712f0e7cfbf6981b\" returns successfully" Apr 12 18:54:57.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.22.226:22-147.75.109.163:50718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:57.870450 systemd[1]: Started sshd@9-172.31.22.226:22-147.75.109.163:50718.service. Apr 12 18:54:57.872697 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 18:54:57.872852 kernel: audit: type=1130 audit(1712948097.869:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.22.226:22-147.75.109.163:50718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:57.982770 systemd[1]: run-containerd-runc-k8s.io-a1eebd863ea2942fa37eb591e7dbc5f242376acf1a2c9a4ae7c2f08afc3b84a2-runc.MdZbhs.mount: Deactivated successfully. Apr 12 18:54:58.055000 audit[5044]: USER_ACCT pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.065482 kernel: audit: type=1101 audit(1712948098.055:1397): pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.065546 sshd[5044]: Accepted publickey for core from 147.75.109.163 port 50718 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:54:58.064000 audit[5044]: CRED_ACQ pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.066852 sshd[5044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:58.074232 kernel: audit: type=1103 audit(1712948098.064:1398): pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.074315 kernel: audit: type=1006 audit(1712948098.064:1399): pid=5044 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:54:58.064000 audit[5044]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc0147730 a2=3 a3=0 items=0 ppid=1 pid=5044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:58.083214 systemd-logind[1633]: New session 10 of user core. Apr 12 18:54:58.084165 systemd[1]: Started session-10.scope. Apr 12 18:54:58.088043 kernel: audit: type=1300 audit(1712948098.064:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc0147730 a2=3 a3=0 items=0 ppid=1 pid=5044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:58.064000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:58.091479 kernel: audit: type=1327 audit(1712948098.064:1399): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:58.092000 audit[5044]: USER_START pid=5044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.109466 kernel: audit: type=1105 audit(1712948098.092:1400): pid=5044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.109596 kernel: audit: type=1103 audit(1712948098.092:1401): pid=5065 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.092000 audit[5065]: CRED_ACQ pid=5065 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.298867 sshd[5044]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:58.299000 audit[5044]: USER_END pid=5044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.299000 audit[5044]: CRED_DISP pid=5044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.310754 systemd[1]: sshd@9-172.31.22.226:22-147.75.109.163:50718.service: Deactivated successfully. Apr 12 18:54:58.311970 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:54:58.315558 systemd-logind[1633]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:54:58.317266 kernel: audit: type=1106 audit(1712948098.299:1402): pid=5044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.317380 kernel: audit: type=1104 audit(1712948098.299:1403): pid=5044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:54:58.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.22.226:22-147.75.109.163:50718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:58.317829 systemd-logind[1633]: Removed session 10. Apr 12 18:55:03.397123 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:55:03.397288 kernel: audit: type=1130 audit(1712948103.365:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.22.226:22-147.75.109.163:50726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:03.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.22.226:22-147.75.109.163:50726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:03.366666 systemd[1]: Started sshd@10-172.31.22.226:22-147.75.109.163:50726.service. Apr 12 18:55:03.576000 audit[5077]: USER_ACCT pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.591852 kernel: audit: type=1101 audit(1712948103.576:1406): pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.592177 sshd[5077]: Accepted publickey for core from 147.75.109.163 port 50726 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:03.590000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.596558 sshd[5077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:03.612847 systemd[1]: Started session-11.scope. Apr 12 18:55:03.615022 kernel: audit: type=1103 audit(1712948103.590:1407): pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.615136 kernel: audit: type=1006 audit(1712948103.591:1408): pid=5077 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:55:03.615176 kernel: audit: type=1300 audit(1712948103.591:1408): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9fb8fe30 a2=3 a3=0 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:03.591000 audit[5077]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9fb8fe30 a2=3 a3=0 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:03.614438 systemd-logind[1633]: New session 11 of user core. Apr 12 18:55:03.591000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:03.628590 kernel: audit: type=1327 audit(1712948103.591:1408): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:03.630000 audit[5077]: USER_START pid=5077 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.634000 audit[5079]: CRED_ACQ pid=5079 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.650717 kernel: audit: type=1105 audit(1712948103.630:1409): pid=5077 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.650827 kernel: audit: type=1103 audit(1712948103.634:1410): pid=5079 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.814068 sshd[5077]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:03.814000 audit[5077]: USER_END pid=5077 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.816000 audit[5077]: CRED_DISP pid=5077 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.826478 systemd-logind[1633]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:55:03.828954 systemd[1]: sshd@10-172.31.22.226:22-147.75.109.163:50726.service: Deactivated successfully. Apr 12 18:55:03.830043 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:55:03.831617 kernel: audit: type=1106 audit(1712948103.814:1411): pid=5077 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.831686 kernel: audit: type=1104 audit(1712948103.816:1412): pid=5077 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:03.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.22.226:22-147.75.109.163:50726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:03.832312 systemd-logind[1633]: Removed session 11. Apr 12 18:55:03.841950 systemd[1]: Started sshd@11-172.31.22.226:22-147.75.109.163:50742.service. Apr 12 18:55:03.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.22.226:22-147.75.109.163:50742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:04.016000 audit[5089]: USER_ACCT pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.018688 sshd[5089]: Accepted publickey for core from 147.75.109.163 port 50742 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:04.018000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.018000 audit[5089]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2183d6d0 a2=3 a3=0 items=0 ppid=1 pid=5089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:04.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:04.020431 sshd[5089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:04.025703 systemd-logind[1633]: New session 12 of user core. Apr 12 18:55:04.026440 systemd[1]: Started session-12.scope. Apr 12 18:55:04.031000 audit[5089]: USER_START pid=5089 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.032000 audit[5093]: CRED_ACQ pid=5093 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.294401 sshd[5089]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:04.295000 audit[5089]: USER_END pid=5089 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.295000 audit[5089]: CRED_DISP pid=5089 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.22.226:22-147.75.109.163:50742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:04.298753 systemd[1]: sshd@11-172.31.22.226:22-147.75.109.163:50742.service: Deactivated successfully. Apr 12 18:55:04.299789 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:55:04.301050 systemd-logind[1633]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:55:04.302125 systemd-logind[1633]: Removed session 12. Apr 12 18:55:04.322887 systemd[1]: Started sshd@12-172.31.22.226:22-147.75.109.163:50750.service. Apr 12 18:55:04.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.22.226:22-147.75.109.163:50750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:04.499000 audit[5100]: USER_ACCT pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.501546 sshd[5100]: Accepted publickey for core from 147.75.109.163 port 50750 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:04.501000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.501000 audit[5100]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3292f800 a2=3 a3=0 items=0 ppid=1 pid=5100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:04.501000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:04.503053 sshd[5100]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:04.534960 systemd-logind[1633]: New session 13 of user core. Apr 12 18:55:04.535073 systemd[1]: Started session-13.scope. Apr 12 18:55:04.571000 audit[5100]: USER_START pid=5100 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.582000 audit[5102]: CRED_ACQ pid=5102 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.771673 sshd[5100]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:04.772000 audit[5100]: USER_END pid=5100 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.772000 audit[5100]: CRED_DISP pid=5100 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:04.775538 systemd[1]: sshd@12-172.31.22.226:22-147.75.109.163:50750.service: Deactivated successfully. Apr 12 18:55:04.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.22.226:22-147.75.109.163:50750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:04.776616 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:55:04.777582 systemd-logind[1633]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:55:04.779815 systemd-logind[1633]: Removed session 13. Apr 12 18:55:07.301000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:07.301000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002724a60 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:55:07.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:07.305000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:07.305000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025fde80 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:55:07.305000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:07.307000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:07.307000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00289a020 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:55:07.307000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:07.312000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:07.312000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002724a80 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:55:07.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:08.090086 systemd[1]: run-containerd-runc-k8s.io-a1eebd863ea2942fa37eb591e7dbc5f242376acf1a2c9a4ae7c2f08afc3b84a2-runc.NSbRbB.mount: Deactivated successfully. Apr 12 18:55:09.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.22.226:22-147.75.109.163:42890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:09.798921 systemd[1]: Started sshd@13-172.31.22.226:22-147.75.109.163:42890.service. Apr 12 18:55:09.800911 kernel: kauditd_printk_skb: 35 callbacks suppressed Apr 12 18:55:09.801020 kernel: audit: type=1130 audit(1712948109.797:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.22.226:22-147.75.109.163:42890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:09.986581 kernel: audit: type=1101 audit(1712948109.976:1437): pid=5139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:09.976000 audit[5139]: USER_ACCT pid=5139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:09.986830 sshd[5139]: Accepted publickey for core from 147.75.109.163 port 42890 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:09.984000 audit[5139]: CRED_ACQ pid=5139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:09.986914 sshd[5139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:09.999215 systemd[1]: Started session-14.scope. Apr 12 18:55:09.999905 kernel: audit: type=1103 audit(1712948109.984:1438): pid=5139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.000031 kernel: audit: type=1006 audit(1712948109.985:1439): pid=5139 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:55:09.985000 audit[5139]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe30d17610 a2=3 a3=0 items=0 ppid=1 pid=5139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:10.000506 systemd-logind[1633]: New session 14 of user core. Apr 12 18:55:10.012257 kernel: audit: type=1300 audit(1712948109.985:1439): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe30d17610 a2=3 a3=0 items=0 ppid=1 pid=5139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:09.985000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:10.017494 kernel: audit: type=1327 audit(1712948109.985:1439): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:10.017592 kernel: audit: type=1105 audit(1712948110.011:1440): pid=5139 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.011000 audit[5139]: USER_START pid=5139 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.016000 audit[5141]: CRED_ACQ pid=5141 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.032483 kernel: audit: type=1103 audit(1712948110.016:1441): pid=5141 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.247485 sshd[5139]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:10.247000 audit[5139]: USER_END pid=5139 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.247000 audit[5139]: CRED_DISP pid=5139 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.262677 systemd-logind[1633]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:55:10.265184 systemd[1]: sshd@13-172.31.22.226:22-147.75.109.163:42890.service: Deactivated successfully. Apr 12 18:55:10.266445 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:55:10.269818 kernel: audit: type=1106 audit(1712948110.247:1442): pid=5139 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.270317 kernel: audit: type=1104 audit(1712948110.247:1443): pid=5139 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:10.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.22.226:22-147.75.109.163:42890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:10.268953 systemd-logind[1633]: Removed session 14. Apr 12 18:55:12.929787 systemd[1]: run-containerd-runc-k8s.io-fee77324393c6b7e003d12b4bd3e3d4ad19587e4fe5261213f8185b55907a21d-runc.m9kCG3.mount: Deactivated successfully. Apr 12 18:55:15.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.22.226:22-147.75.109.163:42898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:15.275538 systemd[1]: Started sshd@14-172.31.22.226:22-147.75.109.163:42898.service. Apr 12 18:55:15.278475 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:55:15.278696 kernel: audit: type=1130 audit(1712948115.274:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.22.226:22-147.75.109.163:42898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:15.479503 kernel: audit: type=1101 audit(1712948115.468:1446): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.468000 audit[5174]: USER_ACCT pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.479722 sshd[5174]: Accepted publickey for core from 147.75.109.163 port 42898 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:15.477000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.487393 kernel: audit: type=1103 audit(1712948115.477:1447): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.487600 sshd[5174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:15.477000 audit[5174]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6426e80 a2=3 a3=0 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:15.496143 systemd[1]: Started session-15.scope. Apr 12 18:55:15.499077 systemd-logind[1633]: New session 15 of user core. Apr 12 18:55:15.500874 kernel: audit: type=1006 audit(1712948115.477:1448): pid=5174 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:55:15.500951 kernel: audit: type=1300 audit(1712948115.477:1448): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6426e80 a2=3 a3=0 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:15.477000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:15.503536 kernel: audit: type=1327 audit(1712948115.477:1448): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:15.505000 audit[5174]: USER_START pid=5174 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.530087 kernel: audit: type=1105 audit(1712948115.505:1449): pid=5174 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.530902 kernel: audit: type=1103 audit(1712948115.510:1450): pid=5176 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.510000 audit[5176]: CRED_ACQ pid=5176 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.715001 sshd[5174]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:15.715000 audit[5174]: USER_END pid=5174 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.725059 systemd[1]: sshd@14-172.31.22.226:22-147.75.109.163:42898.service: Deactivated successfully. Apr 12 18:55:15.725440 kernel: audit: type=1106 audit(1712948115.715:1451): pid=5174 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.726016 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:55:15.715000 audit[5174]: CRED_DISP pid=5174 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:15.727749 systemd-logind[1633]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:55:15.729268 systemd-logind[1633]: Removed session 15. Apr 12 18:55:15.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.22.226:22-147.75.109.163:42898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:15.734444 kernel: audit: type=1104 audit(1712948115.715:1452): pid=5174 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:20.748386 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:55:20.748522 kernel: audit: type=1130 audit(1712948120.744:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.22.226:22-147.75.109.163:60538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:20.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.22.226:22-147.75.109.163:60538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:20.745513 systemd[1]: Started sshd@15-172.31.22.226:22-147.75.109.163:60538.service. Apr 12 18:55:20.920000 audit[5196]: USER_ACCT pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:20.929048 sshd[5196]: Accepted publickey for core from 147.75.109.163 port 60538 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:20.929380 kernel: audit: type=1101 audit(1712948120.920:1455): pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:20.928000 audit[5196]: CRED_ACQ pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:20.930133 sshd[5196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:20.940975 systemd[1]: Started session-16.scope. Apr 12 18:55:20.944021 kernel: audit: type=1103 audit(1712948120.928:1456): pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:20.944114 kernel: audit: type=1006 audit(1712948120.928:1457): pid=5196 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:55:20.944158 kernel: audit: type=1300 audit(1712948120.928:1457): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff84089020 a2=3 a3=0 items=0 ppid=1 pid=5196 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.928000 audit[5196]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff84089020 a2=3 a3=0 items=0 ppid=1 pid=5196 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.943277 systemd-logind[1633]: New session 16 of user core. Apr 12 18:55:20.928000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:20.954317 kernel: audit: type=1327 audit(1712948120.928:1457): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:20.954000 audit[5196]: USER_START pid=5196 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:20.964455 kernel: audit: type=1105 audit(1712948120.954:1458): pid=5196 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:20.964529 kernel: audit: type=1103 audit(1712948120.954:1459): pid=5198 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:20.954000 audit[5198]: CRED_ACQ pid=5198 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:21.246487 sshd[5196]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:21.247000 audit[5196]: USER_END pid=5196 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:21.247000 audit[5196]: CRED_DISP pid=5196 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:21.263183 kernel: audit: type=1106 audit(1712948121.247:1460): pid=5196 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:21.263284 kernel: audit: type=1104 audit(1712948121.247:1461): pid=5196 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:21.268059 systemd[1]: sshd@15-172.31.22.226:22-147.75.109.163:60538.service: Deactivated successfully. Apr 12 18:55:21.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.22.226:22-147.75.109.163:60538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:21.269608 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:55:21.270121 systemd-logind[1633]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:55:21.271308 systemd-logind[1633]: Removed session 16. Apr 12 18:55:26.273954 systemd[1]: Started sshd@16-172.31.22.226:22-147.75.109.163:60544.service. Apr 12 18:55:26.277402 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:55:26.277489 kernel: audit: type=1130 audit(1712948126.273:1463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.22.226:22-147.75.109.163:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:26.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.22.226:22-147.75.109.163:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:26.469000 audit[5210]: USER_ACCT pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.478108 sshd[5210]: Accepted publickey for core from 147.75.109.163 port 60544 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:26.478461 kernel: audit: type=1101 audit(1712948126.469:1464): pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.476000 audit[5210]: CRED_ACQ pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.479093 sshd[5210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:26.485392 kernel: audit: type=1103 audit(1712948126.476:1465): pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.476000 audit[5210]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff27370670 a2=3 a3=0 items=0 ppid=1 pid=5210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:26.491353 systemd[1]: Started session-17.scope. Apr 12 18:55:26.494045 systemd-logind[1633]: New session 17 of user core. Apr 12 18:55:26.497657 kernel: audit: type=1006 audit(1712948126.476:1466): pid=5210 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 18:55:26.497732 kernel: audit: type=1300 audit(1712948126.476:1466): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff27370670 a2=3 a3=0 items=0 ppid=1 pid=5210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:26.499217 kernel: audit: type=1327 audit(1712948126.476:1466): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:26.476000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:26.502000 audit[5210]: USER_START pid=5210 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.512399 kernel: audit: type=1105 audit(1712948126.502:1467): pid=5210 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.511000 audit[5212]: CRED_ACQ pid=5212 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.520434 kernel: audit: type=1103 audit(1712948126.511:1468): pid=5212 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.700845 sshd[5210]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:26.701000 audit[5210]: USER_END pid=5210 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.705437 systemd[1]: sshd@16-172.31.22.226:22-147.75.109.163:60544.service: Deactivated successfully. Apr 12 18:55:26.706539 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:55:26.708524 systemd-logind[1633]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:55:26.709823 systemd-logind[1633]: Removed session 17. Apr 12 18:55:26.702000 audit[5210]: CRED_DISP pid=5210 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.717906 kernel: audit: type=1106 audit(1712948126.701:1469): pid=5210 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.717982 kernel: audit: type=1104 audit(1712948126.702:1470): pid=5210 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.22.226:22-147.75.109.163:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:26.727685 systemd[1]: Started sshd@17-172.31.22.226:22-147.75.109.163:60548.service. Apr 12 18:55:26.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.22.226:22-147.75.109.163:60548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:26.894000 audit[5222]: USER_ACCT pid=5222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.895763 sshd[5222]: Accepted publickey for core from 147.75.109.163 port 60548 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:26.895000 audit[5222]: CRED_ACQ pid=5222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.895000 audit[5222]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd78674350 a2=3 a3=0 items=0 ppid=1 pid=5222 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:26.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:26.897347 sshd[5222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:26.902654 systemd[1]: Started session-18.scope. Apr 12 18:55:26.903349 systemd-logind[1633]: New session 18 of user core. Apr 12 18:55:26.907000 audit[5222]: USER_START pid=5222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:26.908000 audit[5224]: CRED_ACQ pid=5224 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:27.571475 sshd[5222]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:27.575000 audit[5222]: USER_END pid=5222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:27.576000 audit[5222]: CRED_DISP pid=5222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:27.579111 systemd[1]: sshd@17-172.31.22.226:22-147.75.109.163:60548.service: Deactivated successfully. Apr 12 18:55:27.579163 systemd-logind[1633]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:55:27.580134 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:55:27.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.22.226:22-147.75.109.163:60548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:27.581712 systemd-logind[1633]: Removed session 18. Apr 12 18:55:27.598206 systemd[1]: Started sshd@18-172.31.22.226:22-147.75.109.163:33032.service. Apr 12 18:55:27.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.22.226:22-147.75.109.163:33032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:27.784000 audit[5232]: USER_ACCT pid=5232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:27.785839 sshd[5232]: Accepted publickey for core from 147.75.109.163 port 33032 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:27.786000 audit[5232]: CRED_ACQ pid=5232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:27.786000 audit[5232]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff36a9dda0 a2=3 a3=0 items=0 ppid=1 pid=5232 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:27.786000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:27.787439 sshd[5232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:27.794040 systemd[1]: Started session-19.scope. Apr 12 18:55:27.794897 systemd-logind[1633]: New session 19 of user core. Apr 12 18:55:27.800000 audit[5232]: USER_START pid=5232 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:27.802000 audit[5234]: CRED_ACQ pid=5234 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.059327 sshd[5232]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:30.061000 audit[5232]: USER_END pid=5232 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.061000 audit[5232]: CRED_DISP pid=5232 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.063000 audit[5270]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=5270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:30.063000 audit[5270]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffda206a8c0 a2=0 a3=7ffda206a8ac items=0 ppid=3054 pid=5270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:30.063000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:30.065000 audit[5270]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:30.065000 audit[5270]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffda206a8c0 a2=0 a3=0 items=0 ppid=3054 pid=5270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:30.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:30.072094 systemd[1]: sshd@18-172.31.22.226:22-147.75.109.163:33032.service: Deactivated successfully. Apr 12 18:55:30.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.22.226:22-147.75.109.163:33032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:30.073186 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:55:30.074931 systemd-logind[1633]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:55:30.076957 systemd-logind[1633]: Removed session 19. Apr 12 18:55:30.081000 audit[5273]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=5273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:30.081000 audit[5273]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd2932fd00 a2=0 a3=7ffd2932fcec items=0 ppid=3054 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:30.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:30.085395 systemd[1]: Started sshd@19-172.31.22.226:22-147.75.109.163:33034.service. Apr 12 18:55:30.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.22.226:22-147.75.109.163:33034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:30.083000 audit[5273]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:30.083000 audit[5273]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd2932fd00 a2=0 a3=0 items=0 ppid=3054 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:30.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:30.254000 audit[5275]: USER_ACCT pid=5275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.255629 sshd[5275]: Accepted publickey for core from 147.75.109.163 port 33034 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:30.256000 audit[5275]: CRED_ACQ pid=5275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.256000 audit[5275]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00435d80 a2=3 a3=0 items=0 ppid=1 pid=5275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:30.256000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:30.257798 sshd[5275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:30.264471 systemd[1]: Started session-20.scope. Apr 12 18:55:30.265155 systemd-logind[1633]: New session 20 of user core. Apr 12 18:55:30.270000 audit[5275]: USER_START pid=5275 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.272000 audit[5277]: CRED_ACQ pid=5277 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.738318 sshd[5275]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:30.739000 audit[5275]: USER_END pid=5275 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.740000 audit[5275]: CRED_DISP pid=5275 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.22.226:22-147.75.109.163:33034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:30.742233 systemd[1]: sshd@19-172.31.22.226:22-147.75.109.163:33034.service: Deactivated successfully. Apr 12 18:55:30.743934 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:55:30.744713 systemd-logind[1633]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:55:30.745865 systemd-logind[1633]: Removed session 20. Apr 12 18:55:30.765740 systemd[1]: Started sshd@20-172.31.22.226:22-147.75.109.163:33048.service. Apr 12 18:55:30.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.22.226:22-147.75.109.163:33048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:30.931000 audit[5284]: USER_ACCT pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.932593 sshd[5284]: Accepted publickey for core from 147.75.109.163 port 33048 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:30.933000 audit[5284]: CRED_ACQ pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.933000 audit[5284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2dabd570 a2=3 a3=0 items=0 ppid=1 pid=5284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:30.933000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:30.933982 sshd[5284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:30.939489 systemd[1]: Started session-21.scope. Apr 12 18:55:30.940832 systemd-logind[1633]: New session 21 of user core. Apr 12 18:55:30.949000 audit[5284]: USER_START pid=5284 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:30.951000 audit[5286]: CRED_ACQ pid=5286 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:31.146620 sshd[5284]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:31.148000 audit[5284]: USER_END pid=5284 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:31.148000 audit[5284]: CRED_DISP pid=5284 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:31.150845 systemd-logind[1633]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:55:31.151068 systemd[1]: sshd@20-172.31.22.226:22-147.75.109.163:33048.service: Deactivated successfully. Apr 12 18:55:31.152204 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:55:31.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.22.226:22-147.75.109.163:33048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:31.153448 systemd-logind[1633]: Removed session 21. Apr 12 18:55:36.174316 systemd[1]: Started sshd@21-172.31.22.226:22-147.75.109.163:33054.service. Apr 12 18:55:36.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.22.226:22-147.75.109.163:33054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:36.177826 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 18:55:36.177978 kernel: audit: type=1130 audit(1712948136.174:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.22.226:22-147.75.109.163:33054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:36.352660 sshd[5297]: Accepted publickey for core from 147.75.109.163 port 33054 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:36.354516 sshd[5297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:36.352000 audit[5297]: USER_ACCT pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.370123 kernel: audit: type=1101 audit(1712948136.352:1513): pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.370406 kernel: audit: type=1103 audit(1712948136.353:1514): pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.353000 audit[5297]: CRED_ACQ pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.376557 systemd[1]: Started session-22.scope. Apr 12 18:55:36.378688 systemd-logind[1633]: New session 22 of user core. Apr 12 18:55:36.353000 audit[5297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4af04810 a2=3 a3=0 items=0 ppid=1 pid=5297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:36.395329 kernel: audit: type=1006 audit(1712948136.353:1515): pid=5297 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:55:36.395423 kernel: audit: type=1300 audit(1712948136.353:1515): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4af04810 a2=3 a3=0 items=0 ppid=1 pid=5297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:36.353000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:36.387000 audit[5297]: USER_START pid=5297 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.413216 kernel: audit: type=1327 audit(1712948136.353:1515): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:36.413334 kernel: audit: type=1105 audit(1712948136.387:1516): pid=5297 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.387000 audit[5299]: CRED_ACQ pid=5299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.421404 kernel: audit: type=1103 audit(1712948136.387:1517): pid=5299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.627557 sshd[5297]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:36.628000 audit[5297]: USER_END pid=5297 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.631204 systemd[1]: sshd@21-172.31.22.226:22-147.75.109.163:33054.service: Deactivated successfully. Apr 12 18:55:36.632299 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:55:36.638398 kernel: audit: type=1106 audit(1712948136.628:1518): pid=5297 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.638834 systemd-logind[1633]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:55:36.628000 audit[5297]: CRED_DISP pid=5297 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.643818 systemd-logind[1633]: Removed session 22. Apr 12 18:55:36.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.22.226:22-147.75.109.163:33054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:36.647382 kernel: audit: type=1104 audit(1712948136.628:1519): pid=5297 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:36.742000 audit[5309]: NETFILTER_CFG table=filter:117 family=2 entries=33 op=nft_register_rule pid=5309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:36.742000 audit[5309]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffeb50294d0 a2=0 a3=7ffeb50294bc items=0 ppid=3054 pid=5309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:36.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:36.743000 audit[5309]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:36.743000 audit[5309]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeb50294d0 a2=0 a3=0 items=0 ppid=3054 pid=5309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:36.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:36.793000 audit[5311]: NETFILTER_CFG table=filter:119 family=2 entries=34 op=nft_register_rule pid=5311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:36.793000 audit[5311]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffc89c2dd20 a2=0 a3=7ffc89c2dd0c items=0 ppid=3054 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:36.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:36.799517 kubelet[2657]: I0412 18:55:36.799484 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-nzrsx" podStartSLOduration=74.191882163 podStartE2EDuration="1m20.799408153s" podCreationTimestamp="2024-04-12 18:54:16 +0000 UTC" firstStartedPulling="2024-04-12 18:54:42.428562716 +0000 UTC m=+45.677037250" lastFinishedPulling="2024-04-12 18:54:49.036088711 +0000 UTC m=+52.284563240" observedRunningTime="2024-04-12 18:54:49.234817155 +0000 UTC m=+52.483291699" watchObservedRunningTime="2024-04-12 18:55:36.799408153 +0000 UTC m=+100.047882697" Apr 12 18:55:36.804257 kubelet[2657]: I0412 18:55:36.804223 2657 topology_manager.go:215] "Topology Admit Handler" podUID="ad13613c-4921-4821-9de4-dcb0d5bff7f7" podNamespace="calico-apiserver" podName="calico-apiserver-5c4bc96569-jzf64" Apr 12 18:55:36.813339 systemd[1]: Created slice kubepods-besteffort-podad13613c_4921_4821_9de4_dcb0d5bff7f7.slice. Apr 12 18:55:36.794000 audit[5311]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:36.794000 audit[5311]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc89c2dd20 a2=0 a3=0 items=0 ppid=3054 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:36.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:36.910282 kubelet[2657]: I0412 18:55:36.910174 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ad13613c-4921-4821-9de4-dcb0d5bff7f7-calico-apiserver-certs\") pod \"calico-apiserver-5c4bc96569-jzf64\" (UID: \"ad13613c-4921-4821-9de4-dcb0d5bff7f7\") " pod="calico-apiserver/calico-apiserver-5c4bc96569-jzf64" Apr 12 18:55:36.910531 kubelet[2657]: I0412 18:55:36.910518 2657 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fs4gm\" (UniqueName: \"kubernetes.io/projected/ad13613c-4921-4821-9de4-dcb0d5bff7f7-kube-api-access-fs4gm\") pod \"calico-apiserver-5c4bc96569-jzf64\" (UID: \"ad13613c-4921-4821-9de4-dcb0d5bff7f7\") " pod="calico-apiserver/calico-apiserver-5c4bc96569-jzf64" Apr 12 18:55:37.117912 env[1648]: time="2024-04-12T18:55:37.117863806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4bc96569-jzf64,Uid:ad13613c-4921-4821-9de4-dcb0d5bff7f7,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:55:37.388456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif16bfff961d: link becomes ready Apr 12 18:55:37.389015 systemd-networkd[1460]: calif16bfff961d: Link UP Apr 12 18:55:37.389208 systemd-networkd[1460]: calif16bfff961d: Gained carrier Apr 12 18:55:37.391526 (udev-worker)[5333]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.284 [INFO][5314] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0 calico-apiserver-5c4bc96569- calico-apiserver ad13613c-4921-4821-9de4-dcb0d5bff7f7 1067 0 2024-04-12 18:55:36 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c4bc96569 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-22-226 calico-apiserver-5c4bc96569-jzf64 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif16bfff961d [] []}} ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Namespace="calico-apiserver" Pod="calico-apiserver-5c4bc96569-jzf64" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.284 [INFO][5314] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Namespace="calico-apiserver" Pod="calico-apiserver-5c4bc96569-jzf64" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.338 [INFO][5326] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" HandleID="k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Workload="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.347 [INFO][5326] ipam_plugin.go 268: Auto assigning IP ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" HandleID="k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Workload="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c39f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-22-226", "pod":"calico-apiserver-5c4bc96569-jzf64", "timestamp":"2024-04-12 18:55:37.337557771 +0000 UTC"}, Hostname:"ip-172-31-22-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.347 [INFO][5326] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.347 [INFO][5326] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.348 [INFO][5326] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-22-226' Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.350 [INFO][5326] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.354 [INFO][5326] ipam.go 372: Looking up existing affinities for host host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.358 [INFO][5326] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.359 [INFO][5326] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.361 [INFO][5326] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.361 [INFO][5326] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.363 [INFO][5326] ipam.go 1682: Creating new handle: k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.368 [INFO][5326] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.379 [INFO][5326] ipam.go 1216: Successfully claimed IPs: [192.168.32.5/26] block=192.168.32.0/26 handle="k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.379 [INFO][5326] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.5/26] handle="k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" host="ip-172-31-22-226" Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.379 [INFO][5326] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:55:37.408594 env[1648]: 2024-04-12 18:55:37.379 [INFO][5326] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.32.5/26] IPv6=[] ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" HandleID="k8s-pod-network.56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Workload="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" Apr 12 18:55:37.409616 env[1648]: 2024-04-12 18:55:37.383 [INFO][5314] k8s.go 385: Populated endpoint ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Namespace="calico-apiserver" Pod="calico-apiserver-5c4bc96569-jzf64" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0", GenerateName:"calico-apiserver-5c4bc96569-", Namespace:"calico-apiserver", SelfLink:"", UID:"ad13613c-4921-4821-9de4-dcb0d5bff7f7", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 55, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4bc96569", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"", Pod:"calico-apiserver-5c4bc96569-jzf64", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif16bfff961d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:55:37.409616 env[1648]: 2024-04-12 18:55:37.383 [INFO][5314] k8s.go 386: Calico CNI using IPs: [192.168.32.5/32] ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Namespace="calico-apiserver" Pod="calico-apiserver-5c4bc96569-jzf64" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" Apr 12 18:55:37.409616 env[1648]: 2024-04-12 18:55:37.383 [INFO][5314] dataplane_linux.go 68: Setting the host side veth name to calif16bfff961d ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Namespace="calico-apiserver" Pod="calico-apiserver-5c4bc96569-jzf64" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" Apr 12 18:55:37.409616 env[1648]: 2024-04-12 18:55:37.388 [INFO][5314] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Namespace="calico-apiserver" Pod="calico-apiserver-5c4bc96569-jzf64" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" Apr 12 18:55:37.409616 env[1648]: 2024-04-12 18:55:37.393 [INFO][5314] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Namespace="calico-apiserver" Pod="calico-apiserver-5c4bc96569-jzf64" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0", GenerateName:"calico-apiserver-5c4bc96569-", Namespace:"calico-apiserver", SelfLink:"", UID:"ad13613c-4921-4821-9de4-dcb0d5bff7f7", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 55, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4bc96569", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-22-226", ContainerID:"56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a", Pod:"calico-apiserver-5c4bc96569-jzf64", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif16bfff961d", MAC:"ca:74:a2:9c:29:42", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:55:37.409616 env[1648]: 2024-04-12 18:55:37.404 [INFO][5314] k8s.go 498: Wrote updated endpoint to datastore ContainerID="56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a" Namespace="calico-apiserver" Pod="calico-apiserver-5c4bc96569-jzf64" WorkloadEndpoint="ip--172--31--22--226-k8s-calico--apiserver--5c4bc96569--jzf64-eth0" Apr 12 18:55:37.436057 env[1648]: time="2024-04-12T18:55:37.435284226Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:55:37.436057 env[1648]: time="2024-04-12T18:55:37.435423642Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:55:37.436057 env[1648]: time="2024-04-12T18:55:37.435473582Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:55:37.436057 env[1648]: time="2024-04-12T18:55:37.435789501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a pid=5352 runtime=io.containerd.runc.v2 Apr 12 18:55:37.467350 systemd[1]: Started cri-containerd-56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a.scope. Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.495000 audit: BPF prog-id=195 op=LOAD Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5352 pid=5362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:37.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623162623731643736623039633434323562633930393761386630 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5352 pid=5362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:37.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623162623731643736623039633434323562633930393761386630 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit: BPF prog-id=196 op=LOAD Apr 12 18:55:37.497000 audit[5362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c3140 items=0 ppid=5352 pid=5362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:37.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623162623731643736623039633434323562633930393761386630 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.497000 audit: BPF prog-id=197 op=LOAD Apr 12 18:55:37.497000 audit[5362]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c3188 items=0 ppid=5352 pid=5362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:37.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623162623731643736623039633434323562633930393761386630 Apr 12 18:55:37.497000 audit: BPF prog-id=197 op=UNLOAD Apr 12 18:55:37.499000 audit: BPF prog-id=196 op=UNLOAD Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { perfmon } for pid=5362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit[5362]: AVC avc: denied { bpf } for pid=5362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:37.499000 audit: BPF prog-id=198 op=LOAD Apr 12 18:55:37.499000 audit[5362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c3598 items=0 ppid=5352 pid=5362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:37.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623162623731643736623039633434323562633930393761386630 Apr 12 18:55:37.506000 audit[5383]: NETFILTER_CFG table=filter:121 family=2 entries=59 op=nft_register_chain pid=5383 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:55:37.506000 audit[5383]: SYSCALL arch=c000003e syscall=46 success=yes exit=30140 a0=3 a1=7fffacbc3510 a2=0 a3=7fffacbc34fc items=0 ppid=3931 pid=5383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:37.506000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:55:37.554901 env[1648]: time="2024-04-12T18:55:37.554846377Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4bc96569-jzf64,Uid:ad13613c-4921-4821-9de4-dcb0d5bff7f7,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a\"" Apr 12 18:55:37.557064 env[1648]: time="2024-04-12T18:55:37.557028653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:55:37.864000 audit[5391]: NETFILTER_CFG table=filter:122 family=2 entries=22 op=nft_register_rule pid=5391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:37.864000 audit[5391]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff073e1960 a2=0 a3=7fff073e194c items=0 ppid=3054 pid=5391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:37.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:37.867000 audit[5391]: NETFILTER_CFG table=nat:123 family=2 entries=104 op=nft_register_chain pid=5391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:37.867000 audit[5391]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff073e1960 a2=0 a3=7fff073e194c items=0 ppid=3054 pid=5391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:37.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:38.858629 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount297177674.mount: Deactivated successfully. Apr 12 18:55:39.362892 systemd-networkd[1460]: calif16bfff961d: Gained IPv6LL Apr 12 18:55:41.357732 env[1648]: time="2024-04-12T18:55:41.357686095Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:41.362021 env[1648]: time="2024-04-12T18:55:41.361980021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:41.369800 env[1648]: time="2024-04-12T18:55:41.369762941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:41.372931 env[1648]: time="2024-04-12T18:55:41.372880714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:41.373224 env[1648]: time="2024-04-12T18:55:41.373193087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:55:41.380119 env[1648]: time="2024-04-12T18:55:41.380071404Z" level=info msg="CreateContainer within sandbox \"56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:55:41.409280 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1125782200.mount: Deactivated successfully. Apr 12 18:55:41.413780 env[1648]: time="2024-04-12T18:55:41.413454686Z" level=info msg="CreateContainer within sandbox \"56b1bb71d76b09c4425bc9097a8f05cf4f0714e1878999143c51c0fa6939886a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e5d0f62acec8479173c1dcafdd9d332cbe45c8b64a1cc68e796fda046bceb301\"" Apr 12 18:55:41.416882 env[1648]: time="2024-04-12T18:55:41.414244124Z" level=info msg="StartContainer for \"e5d0f62acec8479173c1dcafdd9d332cbe45c8b64a1cc68e796fda046bceb301\"" Apr 12 18:55:41.454205 systemd[1]: Started cri-containerd-e5d0f62acec8479173c1dcafdd9d332cbe45c8b64a1cc68e796fda046bceb301.scope. Apr 12 18:55:41.489462 kernel: kauditd_printk_skb: 79 callbacks suppressed Apr 12 18:55:41.489594 kernel: audit: type=1400 audit(1712948141.481:1546): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.497626 kernel: audit: type=1400 audit(1712948141.481:1547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.505521 kernel: audit: type=1400 audit(1712948141.481:1548): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.513391 kernel: audit: type=1400 audit(1712948141.481:1549): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.522391 kernel: audit: type=1400 audit(1712948141.481:1550): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.536189 kernel: audit: type=1400 audit(1712948141.481:1551): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.536303 kernel: audit: type=1400 audit(1712948141.481:1552): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.536343 kernel: audit: type=1400 audit(1712948141.481:1553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.549943 kernel: audit: type=1400 audit(1712948141.481:1554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.556441 kernel: audit: type=1400 audit(1712948141.481:1555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.558771 env[1648]: time="2024-04-12T18:55:41.556575235Z" level=info msg="StartContainer for \"e5d0f62acec8479173c1dcafdd9d332cbe45c8b64a1cc68e796fda046bceb301\" returns successfully" Apr 12 18:55:41.481000 audit: BPF prog-id=199 op=LOAD Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5352 pid=5406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:41.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643066363261636563383437393137336331646361666464396433 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5352 pid=5406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:41.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643066363261636563383437393137336331646361666464396433 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.489000 audit: BPF prog-id=200 op=LOAD Apr 12 18:55:41.489000 audit[5406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d3d10 items=0 ppid=5352 pid=5406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:41.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643066363261636563383437393137336331646361666464396433 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit: BPF prog-id=201 op=LOAD Apr 12 18:55:41.490000 audit[5406]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d3d58 items=0 ppid=5352 pid=5406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:41.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643066363261636563383437393137336331646361666464396433 Apr 12 18:55:41.490000 audit: BPF prog-id=201 op=UNLOAD Apr 12 18:55:41.490000 audit: BPF prog-id=200 op=UNLOAD Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { perfmon } for pid=5406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit[5406]: AVC avc: denied { bpf } for pid=5406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:41.490000 audit: BPF prog-id=202 op=LOAD Apr 12 18:55:41.490000 audit[5406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000340168 items=0 ppid=5352 pid=5406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:41.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643066363261636563383437393137336331646361666464396433 Apr 12 18:55:41.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.22.226:22-147.75.109.163:56450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:41.655651 systemd[1]: Started sshd@22-172.31.22.226:22-147.75.109.163:56450.service. Apr 12 18:55:41.822000 audit[5439]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:41.822000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8cb453d0 a2=0 a3=7ffd8cb453bc items=0 ppid=3054 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:41.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:41.824000 audit[5439]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:41.824000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffd8cb453d0 a2=0 a3=7ffd8cb453bc items=0 ppid=3054 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:41.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:41.873720 sshd[5436]: Accepted publickey for core from 147.75.109.163 port 56450 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:41.872000 audit[5436]: USER_ACCT pid=5436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:41.875000 audit[5436]: CRED_ACQ pid=5436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:41.875000 audit[5436]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0a7bde70 a2=3 a3=0 items=0 ppid=1 pid=5436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:41.875000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:41.877892 sshd[5436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:41.885408 systemd-logind[1633]: New session 23 of user core. Apr 12 18:55:41.886127 systemd[1]: Started session-23.scope. Apr 12 18:55:41.896000 audit[5436]: USER_START pid=5436 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:41.898000 audit[5440]: CRED_ACQ pid=5440 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:42.404466 systemd[1]: run-containerd-runc-k8s.io-e5d0f62acec8479173c1dcafdd9d332cbe45c8b64a1cc68e796fda046bceb301-runc.3yzMHf.mount: Deactivated successfully. Apr 12 18:55:42.405420 sshd[5436]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:42.407000 audit[5436]: USER_END pid=5436 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:42.407000 audit[5436]: CRED_DISP pid=5436 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:42.409674 systemd-logind[1633]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:55:42.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.22.226:22-147.75.109.163:56450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:42.410203 systemd[1]: sshd@22-172.31.22.226:22-147.75.109.163:56450.service: Deactivated successfully. Apr 12 18:55:42.411898 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:55:42.413793 systemd-logind[1633]: Removed session 23. Apr 12 18:55:42.425000 audit[5451]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=5451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:42.425000 audit[5451]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd9ce35dc0 a2=0 a3=7ffd9ce35dac items=0 ppid=3054 pid=5451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:42.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:42.428000 audit[5451]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=5451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:42.428000 audit[5451]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffd9ce35dc0 a2=0 a3=7ffd9ce35dac items=0 ppid=3054 pid=5451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:42.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:42.511000 audit[5416]: AVC avc: denied { watch } for pid=5416 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_55_37.1877065348/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c450,c992 tclass=file permissive=0 Apr 12 18:55:42.511000 audit[5416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f74be0 a2=fc6 a3=0 items=0 ppid=5352 pid=5416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c992 key=(null) Apr 12 18:55:42.511000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:55:47.430028 systemd[1]: Started sshd@23-172.31.22.226:22-147.75.109.163:49830.service. Apr 12 18:55:47.439159 kernel: kauditd_printk_skb: 73 callbacks suppressed Apr 12 18:55:47.439235 kernel: audit: type=1130 audit(1712948147.430:1578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.22.226:22-147.75.109.163:49830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:47.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.22.226:22-147.75.109.163:49830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:47.617000 audit[5480]: USER_ACCT pid=5480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.621647 sshd[5480]: Accepted publickey for core from 147.75.109.163 port 49830 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:47.625000 audit[5480]: CRED_ACQ pid=5480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.631743 sshd[5480]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:47.633174 kernel: audit: type=1101 audit(1712948147.617:1579): pid=5480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.633261 kernel: audit: type=1103 audit(1712948147.625:1580): pid=5480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.633300 kernel: audit: type=1006 audit(1712948147.626:1581): pid=5480 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:55:47.626000 audit[5480]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8ff40140 a2=3 a3=0 items=0 ppid=1 pid=5480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:47.645135 kernel: audit: type=1300 audit(1712948147.626:1581): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8ff40140 a2=3 a3=0 items=0 ppid=1 pid=5480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:47.645248 kernel: audit: type=1327 audit(1712948147.626:1581): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:47.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:47.644511 systemd[1]: Started session-24.scope. Apr 12 18:55:47.646221 systemd-logind[1633]: New session 24 of user core. Apr 12 18:55:47.653000 audit[5480]: USER_START pid=5480 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.658000 audit[5484]: CRED_ACQ pid=5484 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.669225 kernel: audit: type=1105 audit(1712948147.653:1582): pid=5480 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.669340 kernel: audit: type=1103 audit(1712948147.658:1583): pid=5484 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.947471 sshd[5480]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:47.948000 audit[5480]: USER_END pid=5480 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.948000 audit[5480]: CRED_DISP pid=5480 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.958784 systemd[1]: sshd@23-172.31.22.226:22-147.75.109.163:49830.service: Deactivated successfully. Apr 12 18:55:47.959960 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:55:47.964414 systemd-logind[1633]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:55:47.964967 kernel: audit: type=1106 audit(1712948147.948:1584): pid=5480 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.965027 kernel: audit: type=1104 audit(1712948147.948:1585): pid=5480 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:47.965930 systemd-logind[1633]: Removed session 24. Apr 12 18:55:47.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.22.226:22-147.75.109.163:49830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:52.430000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:52.430000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:52.430000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00144c540 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:55:52.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:52.430000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012c4e10 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:55:52.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:52.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.22.226:22-147.75.109.163:49832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:52.976002 systemd[1]: Started sshd@24-172.31.22.226:22-147.75.109.163:49832.service. Apr 12 18:55:52.978581 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:55:52.981583 kernel: audit: type=1130 audit(1712948152.975:1589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.22.226:22-147.75.109.163:49832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:53.150000 audit[5500]: USER_ACCT pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.153337 sshd[5500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:53.159616 kernel: audit: type=1101 audit(1712948153.150:1590): pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.159674 sshd[5500]: Accepted publickey for core from 147.75.109.163 port 49832 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:53.152000 audit[5500]: CRED_ACQ pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.167402 kernel: audit: type=1103 audit(1712948153.152:1591): pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.176408 kernel: audit: type=1006 audit(1712948153.152:1592): pid=5500 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 18:55:53.176812 systemd-logind[1633]: New session 25 of user core. Apr 12 18:55:53.177509 systemd[1]: Started session-25.scope. Apr 12 18:55:53.152000 audit[5500]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe475996c0 a2=3 a3=0 items=0 ppid=1 pid=5500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:53.189388 kernel: audit: type=1300 audit(1712948153.152:1592): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe475996c0 a2=3 a3=0 items=0 ppid=1 pid=5500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:53.152000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:53.189000 audit[5500]: USER_START pid=5500 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.205147 kernel: audit: type=1327 audit(1712948153.152:1592): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:53.205272 kernel: audit: type=1105 audit(1712948153.189:1593): pid=5500 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.205317 kernel: audit: type=1103 audit(1712948153.191:1594): pid=5502 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.191000 audit[5502]: CRED_ACQ pid=5502 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.333000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:53.341461 kernel: audit: type=1400 audit(1712948153.333:1595): avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:53.333000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00e564da0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:55:53.352408 kernel: audit: type=1300 audit(1712948153.333:1595): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00e564da0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:55:53.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:55:53.342000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:53.342000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00c6d8720 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:55:53.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:55:53.342000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520983 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:53.342000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00c6d8780 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:55:53.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:55:53.366000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:53.366000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00dd7c1e0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:55:53.366000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:55:53.366000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:53.366000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00d4ce1e0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:55:53.366000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:55:53.418150 sshd[5500]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:53.419000 audit[5500]: USER_END pid=5500 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.419000 audit[5500]: CRED_DISP pid=5500 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:53.421855 systemd[1]: sshd@24-172.31.22.226:22-147.75.109.163:49832.service: Deactivated successfully. Apr 12 18:55:53.422909 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:55:53.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.22.226:22-147.75.109.163:49832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:53.424201 systemd-logind[1633]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:55:53.425732 systemd-logind[1633]: Removed session 25. Apr 12 18:55:53.443000 audit[2489]: AVC avc: denied { watch } for pid=2489 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:53.443000 audit[2489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00f7eb7a0 a2=fc6 a3=0 items=0 ppid=2346 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c910 key=(null) Apr 12 18:55:53.443000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 18:55:57.981421 systemd[1]: run-containerd-runc-k8s.io-a1eebd863ea2942fa37eb591e7dbc5f242376acf1a2c9a4ae7c2f08afc3b84a2-runc.FWkusk.mount: Deactivated successfully. Apr 12 18:55:58.449772 systemd[1]: Started sshd@25-172.31.22.226:22-147.75.109.163:42634.service. Apr 12 18:55:58.467036 kernel: kauditd_printk_skb: 19 callbacks suppressed Apr 12 18:55:58.467165 kernel: audit: type=1130 audit(1712948158.449:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.22.226:22-147.75.109.163:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:58.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.22.226:22-147.75.109.163:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:58.634000 audit[5542]: USER_ACCT pid=5542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.649400 kernel: audit: type=1101 audit(1712948158.634:1605): pid=5542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.649542 sshd[5542]: Accepted publickey for core from 147.75.109.163 port 42634 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:55:58.649000 audit[5542]: CRED_ACQ pid=5542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.651502 sshd[5542]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:58.658414 kernel: audit: type=1103 audit(1712948158.649:1606): pid=5542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.669210 systemd[1]: Started session-26.scope. Apr 12 18:55:58.673528 kernel: audit: type=1006 audit(1712948158.650:1607): pid=5542 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:55:58.673440 systemd-logind[1633]: New session 26 of user core. Apr 12 18:55:58.650000 audit[5542]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed295d210 a2=3 a3=0 items=0 ppid=1 pid=5542 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:58.683608 kernel: audit: type=1300 audit(1712948158.650:1607): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed295d210 a2=3 a3=0 items=0 ppid=1 pid=5542 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:58.650000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:58.686393 kernel: audit: type=1327 audit(1712948158.650:1607): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:58.687824 kernel: audit: type=1105 audit(1712948158.683:1608): pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.683000 audit[5542]: USER_START pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.696398 kernel: audit: type=1103 audit(1712948158.686:1609): pid=5544 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.686000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.861915 sshd[5542]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:58.863000 audit[5542]: USER_END pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.863000 audit[5542]: CRED_DISP pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.873746 systemd[1]: sshd@25-172.31.22.226:22-147.75.109.163:42634.service: Deactivated successfully. Apr 12 18:55:58.875340 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:55:58.877782 systemd-logind[1633]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:55:58.879305 kernel: audit: type=1106 audit(1712948158.863:1610): pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.879401 kernel: audit: type=1104 audit(1712948158.863:1611): pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:55:58.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.22.226:22-147.75.109.163:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:58.879819 systemd-logind[1633]: Removed session 26. Apr 12 18:56:03.900680 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:56:03.901019 kernel: audit: type=1130 audit(1712948163.891:1613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.22.226:22-147.75.109.163:42646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:56:03.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.22.226:22-147.75.109.163:42646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:56:03.891584 systemd[1]: Started sshd@26-172.31.22.226:22-147.75.109.163:42646.service. Apr 12 18:56:04.070000 audit[5559]: USER_ACCT pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.080693 sshd[5559]: Accepted publickey for core from 147.75.109.163 port 42646 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:56:04.088651 kernel: audit: type=1101 audit(1712948164.070:1614): pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.088724 kernel: audit: type=1103 audit(1712948164.080:1615): pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.080000 audit[5559]: CRED_ACQ pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.081317 sshd[5559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:56:04.094397 kernel: audit: type=1006 audit(1712948164.080:1616): pid=5559 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 18:56:04.092795 systemd[1]: Started session-27.scope. Apr 12 18:56:04.094491 systemd-logind[1633]: New session 27 of user core. Apr 12 18:56:04.080000 audit[5559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd28bfddd0 a2=3 a3=0 items=0 ppid=1 pid=5559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:04.106411 kernel: audit: type=1300 audit(1712948164.080:1616): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd28bfddd0 a2=3 a3=0 items=0 ppid=1 pid=5559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:04.106600 kernel: audit: type=1327 audit(1712948164.080:1616): proctitle=737368643A20636F7265205B707269765D Apr 12 18:56:04.080000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:56:04.109000 audit[5559]: USER_START pid=5559 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.127410 kernel: audit: type=1105 audit(1712948164.109:1617): pid=5559 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.127574 kernel: audit: type=1103 audit(1712948164.118:1618): pid=5561 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.118000 audit[5561]: CRED_ACQ pid=5561 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.326949 sshd[5559]: pam_unix(sshd:session): session closed for user core Apr 12 18:56:04.328000 audit[5559]: USER_END pid=5559 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.335141 systemd[1]: sshd@26-172.31.22.226:22-147.75.109.163:42646.service: Deactivated successfully. Apr 12 18:56:04.336406 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:56:04.339337 kernel: audit: type=1106 audit(1712948164.328:1619): pid=5559 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.339453 kernel: audit: type=1104 audit(1712948164.328:1620): pid=5559 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.328000 audit[5559]: CRED_DISP pid=5559 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:56:04.338633 systemd-logind[1633]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:56:04.340576 systemd-logind[1633]: Removed session 27. Apr 12 18:56:04.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.22.226:22-147.75.109.163:42646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:56:07.142924 systemd[1]: run-containerd-runc-k8s.io-e5d0f62acec8479173c1dcafdd9d332cbe45c8b64a1cc68e796fda046bceb301-runc.2vboMN.mount: Deactivated successfully. Apr 12 18:56:07.192796 kubelet[2657]: I0412 18:56:07.192531 2657 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c4bc96569-jzf64" podStartSLOduration=27.374390261 podStartE2EDuration="31.192476757s" podCreationTimestamp="2024-04-12 18:55:36 +0000 UTC" firstStartedPulling="2024-04-12 18:55:37.556258183 +0000 UTC m=+100.804732714" lastFinishedPulling="2024-04-12 18:55:41.374344675 +0000 UTC m=+104.622819210" observedRunningTime="2024-04-12 18:55:42.386010062 +0000 UTC m=+105.634484611" watchObservedRunningTime="2024-04-12 18:56:07.192476757 +0000 UTC m=+130.440951302" Apr 12 18:56:07.213000 audit[5593]: NETFILTER_CFG table=filter:128 family=2 entries=9 op=nft_register_rule pid=5593 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:56:07.213000 audit[5593]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe8a275e70 a2=0 a3=7ffe8a275e5c items=0 ppid=3054 pid=5593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:07.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:56:07.216000 audit[5593]: NETFILTER_CFG table=nat:129 family=2 entries=51 op=nft_register_chain pid=5593 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:56:07.216000 audit[5593]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffe8a275e70 a2=0 a3=7ffe8a275e5c items=0 ppid=3054 pid=5593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:07.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:56:07.303000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:56:07.303000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025fd300 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:56:07.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:56:07.308000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:56:07.308000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024c91c0 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:56:07.308000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:56:07.309000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:56:07.309000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024c91e0 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:56:07.309000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:56:07.314000 audit[2547]: AVC avc: denied { watch } for pid=2547 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:56:07.314000 audit[2547]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025fd500 a2=fc6 a3=0 items=0 ppid=2381 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:56:07.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:56:08.090304 systemd[1]: run-containerd-runc-k8s.io-a1eebd863ea2942fa37eb591e7dbc5f242376acf1a2c9a4ae7c2f08afc3b84a2-runc.ZCWbYK.mount: Deactivated successfully. Apr 12 18:56:12.933780 systemd[1]: run-containerd-runc-k8s.io-fee77324393c6b7e003d12b4bd3e3d4ad19587e4fe5261213f8185b55907a21d-runc.rDvIiS.mount: Deactivated successfully. Apr 12 18:56:18.576500 systemd[1]: cri-containerd-e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d.scope: Deactivated successfully. Apr 12 18:56:18.576815 systemd[1]: cri-containerd-e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d.scope: Consumed 5.308s CPU time. Apr 12 18:56:18.576000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:56:18.580203 kernel: kauditd_printk_skb: 19 callbacks suppressed Apr 12 18:56:18.580293 kernel: audit: type=1334 audit(1712948178.576:1628): prog-id=132 op=UNLOAD Apr 12 18:56:18.584000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:56:18.587485 kernel: audit: type=1334 audit(1712948178.584:1629): prog-id=135 op=UNLOAD Apr 12 18:56:18.604185 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d-rootfs.mount: Deactivated successfully. Apr 12 18:56:18.605598 env[1648]: time="2024-04-12T18:56:18.605464143Z" level=info msg="shim disconnected" id=e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d Apr 12 18:56:18.605949 env[1648]: time="2024-04-12T18:56:18.605931274Z" level=warning msg="cleaning up after shim disconnected" id=e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d namespace=k8s.io Apr 12 18:56:18.606035 env[1648]: time="2024-04-12T18:56:18.606023608Z" level=info msg="cleaning up dead shim" Apr 12 18:56:18.617067 env[1648]: time="2024-04-12T18:56:18.616953466Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:56:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5665 runtime=io.containerd.runc.v2\n" Apr 12 18:56:19.061416 kubelet[2657]: E0412 18:56:19.061373 2657 controller.go:195] "Failed to update lease" err="Put \"https://172.31.22.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-226?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:56:19.448732 kubelet[2657]: I0412 18:56:19.448630 2657 scope.go:117] "RemoveContainer" containerID="e17f66b9551334f3f9ccb98e4d50379296d41252925cb86d60059587f419862d" Apr 12 18:56:19.465284 env[1648]: time="2024-04-12T18:56:19.465019880Z" level=info msg="CreateContainer within sandbox \"a103e51cd77feda418260a710e53c67123e68616826a64703103bfcd0e145b22\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Apr 12 18:56:19.507062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1860510046.mount: Deactivated successfully. Apr 12 18:56:19.523595 env[1648]: time="2024-04-12T18:56:19.523547735Z" level=info msg="CreateContainer within sandbox \"a103e51cd77feda418260a710e53c67123e68616826a64703103bfcd0e145b22\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"cd490fba1a8798fb47ce4523f6cbf94a2d29bde2a9a22cb07de1f14b4d153808\"" Apr 12 18:56:19.524087 env[1648]: time="2024-04-12T18:56:19.524053890Z" level=info msg="StartContainer for \"cd490fba1a8798fb47ce4523f6cbf94a2d29bde2a9a22cb07de1f14b4d153808\"" Apr 12 18:56:19.551336 systemd[1]: Started cri-containerd-cd490fba1a8798fb47ce4523f6cbf94a2d29bde2a9a22cb07de1f14b4d153808.scope. Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.583297 kernel: audit: type=1400 audit(1712948179.570:1630): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.583451 kernel: audit: type=1400 audit(1712948179.570:1631): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.583493 kernel: audit: type=1400 audit(1712948179.570:1632): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593953 kernel: audit: type=1400 audit(1712948179.570:1633): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.594024 kernel: audit: type=1400 audit(1712948179.570:1634): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.609269 kernel: audit: type=1400 audit(1712948179.570:1635): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.609380 kernel: audit: type=1400 audit(1712948179.570:1636): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.618303 kernel: audit: type=1400 audit(1712948179.570:1637): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.577000 audit: BPF prog-id=203 op=LOAD Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3079 pid=5686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:19.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364343930666261316138373938666234376365343532336636636266 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3079 pid=5686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:19.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364343930666261316138373938666234376365343532336636636266 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.580000 audit: BPF prog-id=204 op=LOAD Apr 12 18:56:19.580000 audit[5686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a8f40 items=0 ppid=3079 pid=5686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:19.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364343930666261316138373938666234376365343532336636636266 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.593000 audit: BPF prog-id=205 op=LOAD Apr 12 18:56:19.593000 audit[5686]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a8f88 items=0 ppid=3079 pid=5686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:19.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364343930666261316138373938666234376365343532336636636266 Apr 12 18:56:19.612000 audit: BPF prog-id=205 op=UNLOAD Apr 12 18:56:19.612000 audit: BPF prog-id=204 op=UNLOAD Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { perfmon } for pid=5686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit[5686]: AVC avc: denied { bpf } for pid=5686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:19.612000 audit: BPF prog-id=206 op=LOAD Apr 12 18:56:19.612000 audit[5686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a9398 items=0 ppid=3079 pid=5686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:19.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364343930666261316138373938666234376365343532336636636266 Apr 12 18:56:19.636553 env[1648]: time="2024-04-12T18:56:19.636491153Z" level=info msg="StartContainer for \"cd490fba1a8798fb47ce4523f6cbf94a2d29bde2a9a22cb07de1f14b4d153808\" returns successfully" Apr 12 18:56:20.028785 systemd[1]: cri-containerd-dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530.scope: Deactivated successfully. Apr 12 18:56:20.029138 systemd[1]: cri-containerd-dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530.scope: Consumed 3.711s CPU time. Apr 12 18:56:20.031000 audit: BPF prog-id=99 op=UNLOAD Apr 12 18:56:20.031000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:56:20.058851 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530-rootfs.mount: Deactivated successfully. Apr 12 18:56:20.060125 env[1648]: time="2024-04-12T18:56:20.060076788Z" level=info msg="shim disconnected" id=dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530 Apr 12 18:56:20.060258 env[1648]: time="2024-04-12T18:56:20.060128319Z" level=warning msg="cleaning up after shim disconnected" id=dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530 namespace=k8s.io Apr 12 18:56:20.060258 env[1648]: time="2024-04-12T18:56:20.060140766Z" level=info msg="cleaning up dead shim" Apr 12 18:56:20.069857 env[1648]: time="2024-04-12T18:56:20.069809658Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:56:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5726 runtime=io.containerd.runc.v2\n" Apr 12 18:56:20.452736 kubelet[2657]: I0412 18:56:20.452086 2657 scope.go:117] "RemoveContainer" containerID="dc71d86d0158e7051a09c2660bcf47f0271379b8561b435f775656897e4ca530" Apr 12 18:56:20.460739 env[1648]: time="2024-04-12T18:56:20.460698052Z" level=info msg="CreateContainer within sandbox \"6e7dda8d02b52f7514781bb54ae9ff56daa3533c3f76f5602abe7856707ab0ac\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Apr 12 18:56:20.483076 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2482551737.mount: Deactivated successfully. Apr 12 18:56:20.494865 env[1648]: time="2024-04-12T18:56:20.494819691Z" level=info msg="CreateContainer within sandbox \"6e7dda8d02b52f7514781bb54ae9ff56daa3533c3f76f5602abe7856707ab0ac\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"214afbdce765b613a55ad9bac3827a12ea4476cfcb42d325395a595bd98e7dc3\"" Apr 12 18:56:20.495381 env[1648]: time="2024-04-12T18:56:20.495327941Z" level=info msg="StartContainer for \"214afbdce765b613a55ad9bac3827a12ea4476cfcb42d325395a595bd98e7dc3\"" Apr 12 18:56:20.514638 systemd[1]: Started cri-containerd-214afbdce765b613a55ad9bac3827a12ea4476cfcb42d325395a595bd98e7dc3.scope. Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit: BPF prog-id=207 op=LOAD Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2381 pid=5746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346166626463653736356236313361353561643962616333383237 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2381 pid=5746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346166626463653736356236313361353561643962616333383237 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit: BPF prog-id=208 op=LOAD Apr 12 18:56:20.534000 audit[5746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000308680 items=0 ppid=2381 pid=5746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346166626463653736356236313361353561643962616333383237 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.534000 audit: BPF prog-id=209 op=LOAD Apr 12 18:56:20.534000 audit[5746]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003086c8 items=0 ppid=2381 pid=5746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346166626463653736356236313361353561643962616333383237 Apr 12 18:56:20.535000 audit: BPF prog-id=209 op=UNLOAD Apr 12 18:56:20.535000 audit: BPF prog-id=208 op=UNLOAD Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { perfmon } for pid=5746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit[5746]: AVC avc: denied { bpf } for pid=5746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:20.535000 audit: BPF prog-id=210 op=LOAD Apr 12 18:56:20.535000 audit[5746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000308ad8 items=0 ppid=2381 pid=5746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:20.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346166626463653736356236313361353561643962616333383237 Apr 12 18:56:20.569309 env[1648]: time="2024-04-12T18:56:20.569169448Z" level=info msg="StartContainer for \"214afbdce765b613a55ad9bac3827a12ea4476cfcb42d325395a595bd98e7dc3\" returns successfully" Apr 12 18:56:20.606548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3437574520.mount: Deactivated successfully. Apr 12 18:56:21.633000 audit[5757]: AVC avc: denied { watch } for pid=5757 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:56:21.633000 audit[5757]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00007bb00 a2=fc6 a3=0 items=0 ppid=2381 pid=5757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:56:21.633000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:56:21.637000 audit[5757]: AVC avc: denied { watch } for pid=5757 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:56:21.637000 audit[5757]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000158500 a2=fc6 a3=0 items=0 ppid=2381 pid=5757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c236,c737 key=(null) Apr 12 18:56:21.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:56:24.889134 systemd[1]: cri-containerd-c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876.scope: Deactivated successfully. Apr 12 18:56:24.889557 systemd[1]: cri-containerd-c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876.scope: Consumed 1.931s CPU time. Apr 12 18:56:24.892000 audit: BPF prog-id=95 op=UNLOAD Apr 12 18:56:24.898624 kernel: kauditd_printk_skb: 114 callbacks suppressed Apr 12 18:56:24.898743 kernel: audit: type=1334 audit(1712948184.892:1670): prog-id=95 op=UNLOAD Apr 12 18:56:24.898799 kernel: audit: type=1334 audit(1712948184.892:1671): prog-id=109 op=UNLOAD Apr 12 18:56:24.892000 audit: BPF prog-id=109 op=UNLOAD Apr 12 18:56:24.917482 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876-rootfs.mount: Deactivated successfully. Apr 12 18:56:24.918886 env[1648]: time="2024-04-12T18:56:24.918832867Z" level=info msg="shim disconnected" id=c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876 Apr 12 18:56:24.919247 env[1648]: time="2024-04-12T18:56:24.918887903Z" level=warning msg="cleaning up after shim disconnected" id=c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876 namespace=k8s.io Apr 12 18:56:24.919247 env[1648]: time="2024-04-12T18:56:24.918900527Z" level=info msg="cleaning up dead shim" Apr 12 18:56:24.927337 env[1648]: time="2024-04-12T18:56:24.927278309Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:56:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5792 runtime=io.containerd.runc.v2\n" Apr 12 18:56:25.476808 kubelet[2657]: I0412 18:56:25.476777 2657 scope.go:117] "RemoveContainer" containerID="c28f1238dfe07c6170eb1013e52f0f7130adefbd02a7d734397a0eeb73d72876" Apr 12 18:56:25.479562 env[1648]: time="2024-04-12T18:56:25.479511970Z" level=info msg="CreateContainer within sandbox \"709e11256168b65ebfb1d180b271050cd2f012c8edb854eba5202a8297c7d7c4\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Apr 12 18:56:25.502748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3215443022.mount: Deactivated successfully. Apr 12 18:56:25.509480 env[1648]: time="2024-04-12T18:56:25.509427040Z" level=info msg="CreateContainer within sandbox \"709e11256168b65ebfb1d180b271050cd2f012c8edb854eba5202a8297c7d7c4\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"6b50f686909bf48507b5204097be0c42e8e73af2c64a37ed487023fd480b5c25\"" Apr 12 18:56:25.509974 env[1648]: time="2024-04-12T18:56:25.509936900Z" level=info msg="StartContainer for \"6b50f686909bf48507b5204097be0c42e8e73af2c64a37ed487023fd480b5c25\"" Apr 12 18:56:25.536831 systemd[1]: Started cri-containerd-6b50f686909bf48507b5204097be0c42e8e73af2c64a37ed487023fd480b5c25.scope. Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570276 kernel: audit: type=1400 audit(1712948185.554:1672): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570386 kernel: audit: type=1400 audit(1712948185.554:1673): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.603480 kernel: audit: type=1400 audit(1712948185.554:1674): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.603628 kernel: audit: type=1400 audit(1712948185.554:1675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.609261 kernel: audit: type=1400 audit(1712948185.554:1676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.609741 kernel: audit: type=1400 audit(1712948185.554:1677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.620455 kernel: audit: type=1400 audit(1712948185.554:1678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.559000 audit: BPF prog-id=211 op=LOAD Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.629461 kernel: audit: type=1400 audit(1712948185.554:1679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2371 pid=5812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:25.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066363836393039626634383530376235323034303937626530 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2371 pid=5812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:25.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066363836393039626634383530376235323034303937626530 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit: BPF prog-id=212 op=LOAD Apr 12 18:56:25.570000 audit[5812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000376270 items=0 ppid=2371 pid=5812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:25.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066363836393039626634383530376235323034303937626530 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit: BPF prog-id=213 op=LOAD Apr 12 18:56:25.570000 audit[5812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003762b8 items=0 ppid=2371 pid=5812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:25.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066363836393039626634383530376235323034303937626530 Apr 12 18:56:25.570000 audit: BPF prog-id=213 op=UNLOAD Apr 12 18:56:25.570000 audit: BPF prog-id=212 op=UNLOAD Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { perfmon } for pid=5812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit[5812]: AVC avc: denied { bpf } for pid=5812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:56:25.570000 audit: BPF prog-id=214 op=LOAD Apr 12 18:56:25.570000 audit[5812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003766c8 items=0 ppid=2371 pid=5812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:25.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066363836393039626634383530376235323034303937626530 Apr 12 18:56:25.657204 env[1648]: time="2024-04-12T18:56:25.657145074Z" level=info msg="StartContainer for \"6b50f686909bf48507b5204097be0c42e8e73af2c64a37ed487023fd480b5c25\" returns successfully" Apr 12 18:56:29.062337 kubelet[2657]: E0412 18:56:29.062299 2657 controller.go:195] "Failed to update lease" err="Put \"https://172.31.22.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-226?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:56:31.579707 amazon-ssm-agent[1791]: 2024-04-12 18:56:31 INFO [HealthCheck] HealthCheck reporting agent health. Apr 12 18:56:34.748806 update_engine[1634]: I0412 18:56:34.748679 1634 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 18:56:34.749165 update_engine[1634]: I0412 18:56:34.748816 1634 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 18:56:34.754548 update_engine[1634]: I0412 18:56:34.754505 1634 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 18:56:34.755427 update_engine[1634]: I0412 18:56:34.755398 1634 omaha_request_params.cc:62] Current group set to lts Apr 12 18:56:34.772443 update_engine[1634]: I0412 18:56:34.772294 1634 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 18:56:34.772443 update_engine[1634]: I0412 18:56:34.772321 1634 update_attempter.cc:643] Scheduling an action processor start. Apr 12 18:56:34.772443 update_engine[1634]: I0412 18:56:34.772346 1634 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 18:56:34.774447 update_engine[1634]: I0412 18:56:34.774413 1634 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 18:56:34.774559 update_engine[1634]: I0412 18:56:34.774530 1634 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 18:56:34.774559 update_engine[1634]: I0412 18:56:34.774538 1634 omaha_request_action.cc:271] Request: Apr 12 18:56:34.774559 update_engine[1634]: Apr 12 18:56:34.774559 update_engine[1634]: Apr 12 18:56:34.774559 update_engine[1634]: Apr 12 18:56:34.774559 update_engine[1634]: Apr 12 18:56:34.774559 update_engine[1634]: Apr 12 18:56:34.774559 update_engine[1634]: Apr 12 18:56:34.774559 update_engine[1634]: Apr 12 18:56:34.774559 update_engine[1634]: Apr 12 18:56:34.774559 update_engine[1634]: I0412 18:56:34.774544 1634 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:56:34.800020 update_engine[1634]: I0412 18:56:34.799770 1634 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:56:34.804603 update_engine[1634]: I0412 18:56:34.804306 1634 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:56:34.805913 update_engine[1634]: E0412 18:56:34.805776 1634 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:56:34.805913 update_engine[1634]: I0412 18:56:34.805887 1634 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 18:56:34.875236 locksmithd[1685]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 18:56:37.165424 systemd[1]: run-containerd-runc-k8s.io-e5d0f62acec8479173c1dcafdd9d332cbe45c8b64a1cc68e796fda046bceb301-runc.Txe5kS.mount: Deactivated successfully. Apr 12 18:56:39.064995 kubelet[2657]: E0412 18:56:39.064954 2657 controller.go:195] "Failed to update lease" err="Put \"https://172.31.22.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-226?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"