Apr 12 18:21:52.959177 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Apr 12 18:21:52.959254 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:21:52.959283 kernel: efi: EFI v2.70 by EDK II Apr 12 18:21:52.959299 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x7174cf98 Apr 12 18:21:52.959313 kernel: ACPI: Early table checksum verification disabled Apr 12 18:21:52.959327 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Apr 12 18:21:52.959343 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Apr 12 18:21:52.959358 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Apr 12 18:21:52.959372 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Apr 12 18:21:52.959386 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Apr 12 18:21:52.959405 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Apr 12 18:21:52.959419 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Apr 12 18:21:52.959433 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Apr 12 18:21:52.959447 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Apr 12 18:21:52.959464 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Apr 12 18:21:52.959483 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Apr 12 18:21:52.959498 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Apr 12 18:21:52.959512 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Apr 12 18:21:52.959527 kernel: printk: bootconsole [uart0] enabled Apr 12 18:21:52.959542 kernel: NUMA: Failed to initialise from firmware Apr 12 18:21:52.959556 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Apr 12 18:21:52.959571 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Apr 12 18:21:52.959586 kernel: Zone ranges: Apr 12 18:21:52.959601 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Apr 12 18:21:52.959615 kernel: DMA32 empty Apr 12 18:21:52.959629 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Apr 12 18:21:52.959648 kernel: Movable zone start for each node Apr 12 18:21:52.959663 kernel: Early memory node ranges Apr 12 18:21:52.959678 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Apr 12 18:21:52.959693 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Apr 12 18:21:52.959707 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Apr 12 18:21:52.959721 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Apr 12 18:21:52.959736 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Apr 12 18:21:52.959751 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Apr 12 18:21:52.959765 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Apr 12 18:21:52.959780 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Apr 12 18:21:52.959794 kernel: psci: probing for conduit method from ACPI. Apr 12 18:21:52.959809 kernel: psci: PSCIv1.0 detected in firmware. Apr 12 18:21:52.959828 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:21:52.959843 kernel: psci: Trusted OS migration not required Apr 12 18:21:52.959864 kernel: psci: SMC Calling Convention v1.1 Apr 12 18:21:52.959880 kernel: ACPI: SRAT not present Apr 12 18:21:52.959896 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:21:52.959916 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:21:52.959932 kernel: pcpu-alloc: [0] 0 [0] 1 Apr 12 18:21:52.959947 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:21:52.959962 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:21:52.959977 kernel: CPU features: detected: Spectre-v2 Apr 12 18:21:52.959992 kernel: CPU features: detected: Spectre-v3a Apr 12 18:21:52.960007 kernel: CPU features: detected: Spectre-BHB Apr 12 18:21:52.960023 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:21:52.960038 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:21:52.960054 kernel: CPU features: detected: ARM erratum 1742098 Apr 12 18:21:52.960069 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Apr 12 18:21:52.960088 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Apr 12 18:21:52.960104 kernel: Policy zone: Normal Apr 12 18:21:52.960122 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:21:52.960138 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:21:52.960154 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:21:52.960170 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:21:52.960185 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:21:52.960201 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Apr 12 18:21:52.960241 kernel: Memory: 3824652K/4030464K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 205812K reserved, 0K cma-reserved) Apr 12 18:21:52.960260 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:21:52.960281 kernel: trace event string verifier disabled Apr 12 18:21:52.960296 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:21:52.960313 kernel: rcu: RCU event tracing is enabled. Apr 12 18:21:52.960329 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:21:52.960344 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:21:52.960359 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:21:52.960375 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:21:52.961297 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:21:52.961324 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:21:52.961340 kernel: GICv3: 96 SPIs implemented Apr 12 18:21:52.961355 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:21:52.961371 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:21:52.961392 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:21:52.961407 kernel: GICv3: 16 PPIs implemented Apr 12 18:21:52.961422 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Apr 12 18:21:52.961437 kernel: ACPI: SRAT not present Apr 12 18:21:52.961452 kernel: ITS [mem 0x10080000-0x1009ffff] Apr 12 18:21:52.961468 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 18:21:52.961483 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Apr 12 18:21:52.961500 kernel: GICv3: using LPI property table @0x00000004000c0000 Apr 12 18:21:52.961515 kernel: ITS: Using hypervisor restricted LPI range [128] Apr 12 18:21:52.961531 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Apr 12 18:21:52.961546 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Apr 12 18:21:52.961566 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Apr 12 18:21:52.961587 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Apr 12 18:21:52.961603 kernel: Console: colour dummy device 80x25 Apr 12 18:21:52.961619 kernel: printk: console [tty1] enabled Apr 12 18:21:52.961635 kernel: ACPI: Core revision 20210730 Apr 12 18:21:52.961651 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Apr 12 18:21:52.961667 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:21:52.961683 kernel: LSM: Security Framework initializing Apr 12 18:21:52.961698 kernel: SELinux: Initializing. Apr 12 18:21:52.961714 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:21:52.961735 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:21:52.961750 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:21:52.961766 kernel: Platform MSI: ITS@0x10080000 domain created Apr 12 18:21:52.961781 kernel: PCI/MSI: ITS@0x10080000 domain created Apr 12 18:21:52.961797 kernel: Remapping and enabling EFI services. Apr 12 18:21:52.961812 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:21:52.961827 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:21:52.961843 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Apr 12 18:21:52.961859 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Apr 12 18:21:52.961878 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Apr 12 18:21:52.961894 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:21:52.961909 kernel: SMP: Total of 2 processors activated. Apr 12 18:21:52.961925 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:21:52.961940 kernel: CPU features: detected: 32-bit EL1 Support Apr 12 18:21:52.961956 kernel: CPU features: detected: CRC32 instructions Apr 12 18:21:52.961971 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:21:52.961987 kernel: alternatives: patching kernel code Apr 12 18:21:52.962002 kernel: devtmpfs: initialized Apr 12 18:21:52.962022 kernel: KASLR disabled due to lack of seed Apr 12 18:21:52.962038 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:21:52.962054 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:21:52.962080 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:21:52.962106 kernel: SMBIOS 3.0.0 present. Apr 12 18:21:52.962127 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Apr 12 18:21:52.962144 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:21:52.962160 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:21:52.962176 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:21:52.962196 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:21:52.964283 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:21:52.964321 kernel: audit: type=2000 audit(0.250:1): state=initialized audit_enabled=0 res=1 Apr 12 18:21:52.964347 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:21:52.964365 kernel: cpuidle: using governor menu Apr 12 18:21:52.964382 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:21:52.964399 kernel: ASID allocator initialised with 32768 entries Apr 12 18:21:52.964415 kernel: ACPI: bus type PCI registered Apr 12 18:21:52.964436 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:21:52.964452 kernel: Serial: AMBA PL011 UART driver Apr 12 18:21:52.964469 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:21:52.964486 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:21:52.964502 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:21:52.964519 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:21:52.964555 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:21:52.964575 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:21:52.964592 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:21:52.964614 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:21:52.964631 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:21:52.964647 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:21:52.964664 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:21:52.964681 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:21:52.964698 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:21:52.964714 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:21:52.964732 kernel: ACPI: Interpreter enabled Apr 12 18:21:52.964749 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:21:52.964770 kernel: ACPI: MCFG table detected, 1 entries Apr 12 18:21:52.964788 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Apr 12 18:21:52.965146 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:21:52.965427 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Apr 12 18:21:52.965624 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Apr 12 18:21:52.965816 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Apr 12 18:21:52.966008 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Apr 12 18:21:52.966041 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Apr 12 18:21:52.966058 kernel: acpiphp: Slot [1] registered Apr 12 18:21:52.966074 kernel: acpiphp: Slot [2] registered Apr 12 18:21:52.966091 kernel: acpiphp: Slot [3] registered Apr 12 18:21:52.966107 kernel: acpiphp: Slot [4] registered Apr 12 18:21:52.966123 kernel: acpiphp: Slot [5] registered Apr 12 18:21:52.966139 kernel: acpiphp: Slot [6] registered Apr 12 18:21:52.966155 kernel: acpiphp: Slot [7] registered Apr 12 18:21:52.966171 kernel: acpiphp: Slot [8] registered Apr 12 18:21:52.966191 kernel: acpiphp: Slot [9] registered Apr 12 18:21:52.966207 kernel: acpiphp: Slot [10] registered Apr 12 18:21:52.966249 kernel: acpiphp: Slot [11] registered Apr 12 18:21:52.966266 kernel: acpiphp: Slot [12] registered Apr 12 18:21:52.966282 kernel: acpiphp: Slot [13] registered Apr 12 18:21:52.966298 kernel: acpiphp: Slot [14] registered Apr 12 18:21:52.966315 kernel: acpiphp: Slot [15] registered Apr 12 18:21:52.966331 kernel: acpiphp: Slot [16] registered Apr 12 18:21:52.966346 kernel: acpiphp: Slot [17] registered Apr 12 18:21:52.966363 kernel: acpiphp: Slot [18] registered Apr 12 18:21:52.966384 kernel: acpiphp: Slot [19] registered Apr 12 18:21:52.966400 kernel: acpiphp: Slot [20] registered Apr 12 18:21:52.966416 kernel: acpiphp: Slot [21] registered Apr 12 18:21:52.966432 kernel: acpiphp: Slot [22] registered Apr 12 18:21:52.966448 kernel: acpiphp: Slot [23] registered Apr 12 18:21:52.966464 kernel: acpiphp: Slot [24] registered Apr 12 18:21:52.966480 kernel: acpiphp: Slot [25] registered Apr 12 18:21:52.966496 kernel: acpiphp: Slot [26] registered Apr 12 18:21:52.966512 kernel: acpiphp: Slot [27] registered Apr 12 18:21:52.966532 kernel: acpiphp: Slot [28] registered Apr 12 18:21:52.966548 kernel: acpiphp: Slot [29] registered Apr 12 18:21:52.966564 kernel: acpiphp: Slot [30] registered Apr 12 18:21:52.966580 kernel: acpiphp: Slot [31] registered Apr 12 18:21:52.966596 kernel: PCI host bridge to bus 0000:00 Apr 12 18:21:52.966806 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Apr 12 18:21:52.966990 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Apr 12 18:21:52.967171 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Apr 12 18:21:52.967394 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Apr 12 18:21:52.967629 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Apr 12 18:21:52.967842 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Apr 12 18:21:52.968039 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Apr 12 18:21:52.972276 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Apr 12 18:21:52.972505 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Apr 12 18:21:52.972734 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 18:21:52.972945 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Apr 12 18:21:52.973148 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Apr 12 18:21:52.973378 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Apr 12 18:21:52.973578 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Apr 12 18:21:52.973776 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 18:21:52.973971 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Apr 12 18:21:52.974175 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Apr 12 18:21:52.974398 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Apr 12 18:21:52.974592 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Apr 12 18:21:52.974794 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Apr 12 18:21:52.974980 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Apr 12 18:21:52.975157 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Apr 12 18:21:52.975361 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Apr 12 18:21:52.975390 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Apr 12 18:21:52.975408 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Apr 12 18:21:52.975425 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Apr 12 18:21:52.975442 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Apr 12 18:21:52.975459 kernel: iommu: Default domain type: Translated Apr 12 18:21:52.975475 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:21:52.975492 kernel: vgaarb: loaded Apr 12 18:21:52.975508 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:21:52.975524 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:21:52.975545 kernel: PTP clock support registered Apr 12 18:21:52.975561 kernel: Registered efivars operations Apr 12 18:21:52.975578 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:21:52.975593 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:21:52.975610 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:21:52.975626 kernel: pnp: PnP ACPI init Apr 12 18:21:52.975841 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Apr 12 18:21:52.975865 kernel: pnp: PnP ACPI: found 1 devices Apr 12 18:21:52.975882 kernel: NET: Registered PF_INET protocol family Apr 12 18:21:52.975903 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:21:52.975921 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:21:52.975937 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:21:52.975953 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:21:52.975970 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:21:52.975986 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:21:52.976003 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:21:52.976020 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:21:52.976036 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:21:52.976056 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:21:52.976073 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Apr 12 18:21:52.976089 kernel: kvm [1]: HYP mode not available Apr 12 18:21:52.976105 kernel: Initialise system trusted keyrings Apr 12 18:21:52.976122 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:21:52.976138 kernel: Key type asymmetric registered Apr 12 18:21:52.976154 kernel: Asymmetric key parser 'x509' registered Apr 12 18:21:52.976170 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:21:52.976186 kernel: io scheduler mq-deadline registered Apr 12 18:21:52.976206 kernel: io scheduler kyber registered Apr 12 18:21:52.988070 kernel: io scheduler bfq registered Apr 12 18:21:52.988347 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Apr 12 18:21:52.988375 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 18:21:52.988393 kernel: ACPI: button: Power Button [PWRB] Apr 12 18:21:52.988410 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:21:52.988428 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Apr 12 18:21:52.988647 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Apr 12 18:21:52.988681 kernel: printk: console [ttyS0] disabled Apr 12 18:21:52.988699 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Apr 12 18:21:52.988716 kernel: printk: console [ttyS0] enabled Apr 12 18:21:52.988733 kernel: printk: bootconsole [uart0] disabled Apr 12 18:21:52.988749 kernel: thunder_xcv, ver 1.0 Apr 12 18:21:52.988765 kernel: thunder_bgx, ver 1.0 Apr 12 18:21:52.988781 kernel: nicpf, ver 1.0 Apr 12 18:21:52.988798 kernel: nicvf, ver 1.0 Apr 12 18:21:52.988997 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:21:52.989183 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:21:52 UTC (1712946112) Apr 12 18:21:52.989206 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:21:52.989243 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:21:52.989260 kernel: Segment Routing with IPv6 Apr 12 18:21:52.989277 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:21:52.989294 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:21:52.989310 kernel: Key type dns_resolver registered Apr 12 18:21:52.989327 kernel: registered taskstats version 1 Apr 12 18:21:52.989347 kernel: Loading compiled-in X.509 certificates Apr 12 18:21:52.989364 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:21:52.989381 kernel: Key type .fscrypt registered Apr 12 18:21:52.989397 kernel: Key type fscrypt-provisioning registered Apr 12 18:21:52.989412 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:21:52.989429 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:21:52.989445 kernel: ima: No architecture policies found Apr 12 18:21:52.989461 kernel: Freeing unused kernel memory: 36352K Apr 12 18:21:52.989477 kernel: Run /init as init process Apr 12 18:21:52.989497 kernel: with arguments: Apr 12 18:21:52.989513 kernel: /init Apr 12 18:21:52.989529 kernel: with environment: Apr 12 18:21:52.989544 kernel: HOME=/ Apr 12 18:21:52.989560 kernel: TERM=linux Apr 12 18:21:52.989576 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:21:52.989598 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:21:52.989620 systemd[1]: Detected virtualization amazon. Apr 12 18:21:52.989642 systemd[1]: Detected architecture arm64. Apr 12 18:21:52.989660 systemd[1]: Running in initrd. Apr 12 18:21:52.989678 systemd[1]: No hostname configured, using default hostname. Apr 12 18:21:52.989695 systemd[1]: Hostname set to . Apr 12 18:21:52.989713 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:21:52.989731 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:21:52.989748 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:21:52.989765 systemd[1]: Reached target cryptsetup.target. Apr 12 18:21:52.989786 systemd[1]: Reached target paths.target. Apr 12 18:21:52.989804 systemd[1]: Reached target slices.target. Apr 12 18:21:52.989821 systemd[1]: Reached target swap.target. Apr 12 18:21:52.989839 systemd[1]: Reached target timers.target. Apr 12 18:21:52.989858 systemd[1]: Listening on iscsid.socket. Apr 12 18:21:52.989875 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:21:52.989893 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:21:52.989911 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:21:52.989933 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:21:52.989950 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:21:52.989969 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:21:52.989987 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:21:52.990004 systemd[1]: Reached target sockets.target. Apr 12 18:21:52.990022 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:21:52.990039 systemd[1]: Finished network-cleanup.service. Apr 12 18:21:52.990057 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:21:52.990074 systemd[1]: Starting systemd-journald.service... Apr 12 18:21:52.990096 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:21:52.990115 systemd[1]: Starting systemd-resolved.service... Apr 12 18:21:52.990132 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:21:52.990150 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:21:52.990168 kernel: audit: type=1130 audit(1712946112.979:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:52.990186 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:21:52.990206 systemd-journald[268]: Journal started Apr 12 18:21:52.990320 systemd-journald[268]: Runtime Journal (/run/log/journal/ec253655aa92795feba433490981cb5f) is 8.0M, max 75.4M, 67.4M free. Apr 12 18:21:52.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:52.960436 systemd-modules-load[269]: Inserted module 'overlay' Apr 12 18:21:53.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.017243 kernel: audit: type=1130 audit(1712946113.003:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.017308 systemd[1]: Started systemd-journald.service. Apr 12 18:21:53.023239 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:21:53.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.034334 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:21:53.049272 kernel: audit: type=1130 audit(1712946113.025:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.049346 kernel: audit: type=1130 audit(1712946113.040:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.052041 systemd-modules-load[269]: Inserted module 'br_netfilter' Apr 12 18:21:53.056315 kernel: Bridge firewalling registered Apr 12 18:21:53.062652 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:21:53.073472 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:21:53.100956 systemd-resolved[270]: Positive Trust Anchors: Apr 12 18:21:53.100985 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:21:53.101038 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:21:53.107242 kernel: SCSI subsystem initialized Apr 12 18:21:53.135635 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:21:53.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.158688 kernel: audit: type=1130 audit(1712946113.142:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.158756 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:21:53.160622 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:21:53.163826 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:21:53.167386 systemd-modules-load[269]: Inserted module 'dm_multipath' Apr 12 18:21:53.170718 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:21:53.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.174386 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:21:53.186374 kernel: audit: type=1130 audit(1712946113.172:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.186169 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:21:53.195338 kernel: audit: type=1130 audit(1712946113.182:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.198500 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:21:53.219965 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:21:53.230864 kernel: audit: type=1130 audit(1712946113.220:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.230973 dracut-cmdline[289]: dracut-dracut-053 Apr 12 18:21:53.238196 dracut-cmdline[289]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:21:53.380251 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:21:53.402265 kernel: iscsi: registered transport (tcp) Apr 12 18:21:53.429255 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:21:53.429324 kernel: QLogic iSCSI HBA Driver Apr 12 18:21:53.622935 systemd-resolved[270]: Defaulting to hostname 'linux'. Apr 12 18:21:53.625411 kernel: random: crng init done Apr 12 18:21:53.626936 systemd[1]: Started systemd-resolved.service. Apr 12 18:21:53.639548 kernel: audit: type=1130 audit(1712946113.627:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.628938 systemd[1]: Reached target nss-lookup.target. Apr 12 18:21:53.658482 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:21:53.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.661498 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:21:53.729263 kernel: raid6: neonx8 gen() 6373 MB/s Apr 12 18:21:53.746245 kernel: raid6: neonx8 xor() 4809 MB/s Apr 12 18:21:53.764248 kernel: raid6: neonx4 gen() 6521 MB/s Apr 12 18:21:53.782245 kernel: raid6: neonx4 xor() 4995 MB/s Apr 12 18:21:53.800255 kernel: raid6: neonx2 gen() 5750 MB/s Apr 12 18:21:53.818256 kernel: raid6: neonx2 xor() 4582 MB/s Apr 12 18:21:53.836259 kernel: raid6: neonx1 gen() 4450 MB/s Apr 12 18:21:53.854255 kernel: raid6: neonx1 xor() 3688 MB/s Apr 12 18:21:53.872248 kernel: raid6: int64x8 gen() 3423 MB/s Apr 12 18:21:53.890252 kernel: raid6: int64x8 xor() 2090 MB/s Apr 12 18:21:53.908251 kernel: raid6: int64x4 gen() 3779 MB/s Apr 12 18:21:53.926252 kernel: raid6: int64x4 xor() 2195 MB/s Apr 12 18:21:53.944246 kernel: raid6: int64x2 gen() 3596 MB/s Apr 12 18:21:53.962253 kernel: raid6: int64x2 xor() 1951 MB/s Apr 12 18:21:53.980247 kernel: raid6: int64x1 gen() 2762 MB/s Apr 12 18:21:53.999734 kernel: raid6: int64x1 xor() 1449 MB/s Apr 12 18:21:53.999771 kernel: raid6: using algorithm neonx4 gen() 6521 MB/s Apr 12 18:21:53.999795 kernel: raid6: .... xor() 4995 MB/s, rmw enabled Apr 12 18:21:54.001531 kernel: raid6: using neon recovery algorithm Apr 12 18:21:54.020254 kernel: xor: measuring software checksum speed Apr 12 18:21:54.023248 kernel: 8regs : 9279 MB/sec Apr 12 18:21:54.025245 kernel: 32regs : 11098 MB/sec Apr 12 18:21:54.029462 kernel: arm64_neon : 9611 MB/sec Apr 12 18:21:54.029497 kernel: xor: using function: 32regs (11098 MB/sec) Apr 12 18:21:54.121257 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:21:54.138357 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:21:54.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:54.141000 audit: BPF prog-id=7 op=LOAD Apr 12 18:21:54.141000 audit: BPF prog-id=8 op=LOAD Apr 12 18:21:54.143494 systemd[1]: Starting systemd-udevd.service... Apr 12 18:21:54.170675 systemd-udevd[468]: Using default interface naming scheme 'v252'. Apr 12 18:21:54.181514 systemd[1]: Started systemd-udevd.service. Apr 12 18:21:54.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:54.188178 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:21:54.218945 dracut-pre-trigger[472]: rd.md=0: removing MD RAID activation Apr 12 18:21:54.277798 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:21:54.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:54.282337 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:21:54.388197 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:21:54.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:54.518580 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Apr 12 18:21:54.518653 kernel: nvme nvme0: pci function 0000:00:04.0 Apr 12 18:21:54.524728 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Apr 12 18:21:54.524809 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Apr 12 18:21:54.533904 kernel: ena 0000:00:05.0: ENA device version: 0.10 Apr 12 18:21:54.534278 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Apr 12 18:21:54.534492 kernel: nvme nvme0: 2/0/0 default/read/poll queues Apr 12 18:21:54.543243 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:c4:c3:21:17:95 Apr 12 18:21:54.543516 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:21:54.546485 kernel: GPT:9289727 != 16777215 Apr 12 18:21:54.546528 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:21:54.548668 kernel: GPT:9289727 != 16777215 Apr 12 18:21:54.549966 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:21:54.553390 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:21:54.557888 (udev-worker)[527]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:21:54.630255 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (516) Apr 12 18:21:54.663704 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:21:54.711727 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:21:54.757991 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:21:54.762125 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:21:54.786201 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:21:54.791343 systemd[1]: Starting disk-uuid.service... Apr 12 18:21:54.808265 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:21:54.810380 disk-uuid[628]: Primary Header is updated. Apr 12 18:21:54.810380 disk-uuid[628]: Secondary Entries is updated. Apr 12 18:21:54.810380 disk-uuid[628]: Secondary Header is updated. Apr 12 18:21:54.825256 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:21:54.831263 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:21:55.837239 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:21:55.837334 disk-uuid[629]: The operation has completed successfully. Apr 12 18:21:55.992725 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:21:55.992925 systemd[1]: Finished disk-uuid.service. Apr 12 18:21:55.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:55.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:56.036716 systemd[1]: Starting verity-setup.service... Apr 12 18:21:56.069258 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:21:56.154852 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:21:56.161175 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:21:56.167593 systemd[1]: Finished verity-setup.service. Apr 12 18:21:56.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:56.250240 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:21:56.251327 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:21:56.254359 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:21:56.258504 systemd[1]: Starting ignition-setup.service... Apr 12 18:21:56.266980 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:21:56.285293 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:21:56.285359 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:21:56.287808 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:21:56.296270 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:21:56.314514 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:21:56.348360 systemd[1]: Finished ignition-setup.service. Apr 12 18:21:56.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:56.352912 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:21:56.422675 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:21:56.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:56.426000 audit: BPF prog-id=9 op=LOAD Apr 12 18:21:56.428474 systemd[1]: Starting systemd-networkd.service... Apr 12 18:21:56.475050 systemd-networkd[1141]: lo: Link UP Apr 12 18:21:56.475065 systemd-networkd[1141]: lo: Gained carrier Apr 12 18:21:56.478721 systemd-networkd[1141]: Enumeration completed Apr 12 18:21:56.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:56.478874 systemd[1]: Started systemd-networkd.service. Apr 12 18:21:56.479372 systemd-networkd[1141]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:21:56.482987 systemd[1]: Reached target network.target. Apr 12 18:21:56.491712 systemd[1]: Starting iscsiuio.service... Apr 12 18:21:56.498358 systemd-networkd[1141]: eth0: Link UP Apr 12 18:21:56.498556 systemd-networkd[1141]: eth0: Gained carrier Apr 12 18:21:56.507833 systemd[1]: Started iscsiuio.service. Apr 12 18:21:56.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:56.511312 systemd[1]: Starting iscsid.service... Apr 12 18:21:56.512959 systemd-networkd[1141]: eth0: DHCPv4 address 172.31.28.18/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:21:56.522816 iscsid[1146]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:21:56.522816 iscsid[1146]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:21:56.522816 iscsid[1146]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:21:56.522816 iscsid[1146]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:21:56.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:56.548405 iscsid[1146]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:21:56.548405 iscsid[1146]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:21:56.527420 systemd[1]: Started iscsid.service. Apr 12 18:21:56.548421 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:21:56.575956 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:21:56.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:56.579365 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:21:56.582451 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:21:56.584274 systemd[1]: Reached target remote-fs.target. Apr 12 18:21:56.590303 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:21:56.609090 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:21:56.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.054394 ignition[1083]: Ignition 2.14.0 Apr 12 18:21:57.054424 ignition[1083]: Stage: fetch-offline Apr 12 18:21:57.054737 ignition[1083]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:21:57.054803 ignition[1083]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:21:57.072644 ignition[1083]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:21:57.074910 ignition[1083]: Ignition finished successfully Apr 12 18:21:57.077924 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:21:57.089611 kernel: kauditd_printk_skb: 18 callbacks suppressed Apr 12 18:21:57.089649 kernel: audit: type=1130 audit(1712946117.078:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.081462 systemd[1]: Starting ignition-fetch.service... Apr 12 18:21:57.099477 ignition[1165]: Ignition 2.14.0 Apr 12 18:21:57.099883 ignition[1165]: Stage: fetch Apr 12 18:21:57.100313 ignition[1165]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:21:57.100367 ignition[1165]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:21:57.115949 ignition[1165]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:21:57.118754 ignition[1165]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:21:57.128206 ignition[1165]: INFO : PUT result: OK Apr 12 18:21:57.131493 ignition[1165]: DEBUG : parsed url from cmdline: "" Apr 12 18:21:57.131493 ignition[1165]: INFO : no config URL provided Apr 12 18:21:57.131493 ignition[1165]: INFO : reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:21:57.137424 ignition[1165]: INFO : no config at "/usr/lib/ignition/user.ign" Apr 12 18:21:57.137424 ignition[1165]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:21:57.141873 ignition[1165]: INFO : PUT result: OK Apr 12 18:21:57.143425 ignition[1165]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Apr 12 18:21:57.146796 ignition[1165]: INFO : GET result: OK Apr 12 18:21:57.148383 ignition[1165]: DEBUG : parsing config with SHA512: 09513804ed893ef63365102e04a8a898fd30eadc2dd5b60b454231b9de2b71b9240db65877d42fec835df38985d7568b2400975aa60d62066cceb59d30e87d1e Apr 12 18:21:57.212417 unknown[1165]: fetched base config from "system" Apr 12 18:21:57.212682 unknown[1165]: fetched base config from "system" Apr 12 18:21:57.214168 ignition[1165]: fetch: fetch complete Apr 12 18:21:57.212697 unknown[1165]: fetched user config from "aws" Apr 12 18:21:57.214181 ignition[1165]: fetch: fetch passed Apr 12 18:21:57.214309 ignition[1165]: Ignition finished successfully Apr 12 18:21:57.224840 systemd[1]: Finished ignition-fetch.service. Apr 12 18:21:57.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.229384 systemd[1]: Starting ignition-kargs.service... Apr 12 18:21:57.239498 kernel: audit: type=1130 audit(1712946117.226:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.252028 ignition[1171]: Ignition 2.14.0 Apr 12 18:21:57.252056 ignition[1171]: Stage: kargs Apr 12 18:21:57.252376 ignition[1171]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:21:57.252435 ignition[1171]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:21:57.267414 ignition[1171]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:21:57.269788 ignition[1171]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:21:57.273082 ignition[1171]: INFO : PUT result: OK Apr 12 18:21:57.278161 ignition[1171]: kargs: kargs passed Apr 12 18:21:57.280252 systemd[1]: Finished ignition-kargs.service. Apr 12 18:21:57.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.278301 ignition[1171]: Ignition finished successfully Apr 12 18:21:57.285007 systemd[1]: Starting ignition-disks.service... Apr 12 18:21:57.312736 kernel: audit: type=1130 audit(1712946117.282:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.306970 ignition[1177]: Ignition 2.14.0 Apr 12 18:21:57.306990 ignition[1177]: Stage: disks Apr 12 18:21:57.307319 ignition[1177]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:21:57.307377 ignition[1177]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:21:57.327509 ignition[1177]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:21:57.330479 ignition[1177]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:21:57.333010 ignition[1177]: INFO : PUT result: OK Apr 12 18:21:57.338747 ignition[1177]: disks: disks passed Apr 12 18:21:57.338861 ignition[1177]: Ignition finished successfully Apr 12 18:21:57.343372 systemd[1]: Finished ignition-disks.service. Apr 12 18:21:57.346568 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:21:57.348353 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:21:57.350001 systemd[1]: Reached target local-fs.target. Apr 12 18:21:57.351613 systemd[1]: Reached target sysinit.target. Apr 12 18:21:57.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.353237 systemd[1]: Reached target basic.target. Apr 12 18:21:57.356156 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:21:57.386272 kernel: audit: type=1130 audit(1712946117.345:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.404023 systemd-fsck[1185]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 18:21:57.414249 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:21:57.417415 systemd[1]: Mounting sysroot.mount... Apr 12 18:21:57.432327 kernel: audit: type=1130 audit(1712946117.413:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.448258 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:21:57.450072 systemd[1]: Mounted sysroot.mount. Apr 12 18:21:57.451735 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:21:57.467929 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:21:57.473702 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:21:57.473786 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:21:57.473845 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:21:57.489805 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:21:57.505967 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:21:57.510942 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:21:57.532953 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1202) Apr 12 18:21:57.533191 initrd-setup-root[1207]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:21:57.540845 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:21:57.540902 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:21:57.540927 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:21:57.553204 initrd-setup-root[1231]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:21:57.557991 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:21:57.563351 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:21:57.570517 initrd-setup-root[1241]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:21:57.579992 initrd-setup-root[1249]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:21:57.711407 systemd-networkd[1141]: eth0: Gained IPv6LL Apr 12 18:21:57.775787 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:21:57.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.780345 systemd[1]: Starting ignition-mount.service... Apr 12 18:21:57.790085 kernel: audit: type=1130 audit(1712946117.777:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.791080 systemd[1]: Starting sysroot-boot.service... Apr 12 18:21:57.805031 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:21:57.805243 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:21:57.834001 ignition[1268]: INFO : Ignition 2.14.0 Apr 12 18:21:57.834001 ignition[1268]: INFO : Stage: mount Apr 12 18:21:57.837352 ignition[1268]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:21:57.837352 ignition[1268]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:21:57.859348 systemd[1]: Finished sysroot-boot.service. Apr 12 18:21:57.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.872249 kernel: audit: type=1130 audit(1712946117.863:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.872628 ignition[1268]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:21:57.875322 ignition[1268]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:21:57.881362 ignition[1268]: INFO : PUT result: OK Apr 12 18:21:57.887383 ignition[1268]: INFO : mount: mount passed Apr 12 18:21:57.889741 ignition[1268]: INFO : Ignition finished successfully Apr 12 18:21:57.892315 systemd[1]: Finished ignition-mount.service. Apr 12 18:21:57.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.896763 systemd[1]: Starting ignition-files.service... Apr 12 18:21:57.906011 kernel: audit: type=1130 audit(1712946117.894:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:57.913320 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:21:57.931258 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1277) Apr 12 18:21:57.937379 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:21:57.937428 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:21:57.937453 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:21:57.946250 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:21:57.950831 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:21:57.970634 ignition[1296]: INFO : Ignition 2.14.0 Apr 12 18:21:57.970634 ignition[1296]: INFO : Stage: files Apr 12 18:21:57.974057 ignition[1296]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:21:57.974057 ignition[1296]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:21:57.990292 ignition[1296]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:21:57.992928 ignition[1296]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:21:57.996830 ignition[1296]: INFO : PUT result: OK Apr 12 18:21:58.002354 ignition[1296]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:21:58.006452 ignition[1296]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:21:58.006452 ignition[1296]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:21:58.042139 ignition[1296]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:21:58.048273 ignition[1296]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:21:58.052390 unknown[1296]: wrote ssh authorized keys file for user: core Apr 12 18:21:58.054659 ignition[1296]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:21:58.058324 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:21:58.062176 ignition[1296]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:21:58.397498 ignition[1296]: INFO : GET result: OK Apr 12 18:21:58.984176 ignition[1296]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:21:58.988955 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:21:58.988955 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:21:58.996562 ignition[1296]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 18:21:59.044251 ignition[1296]: INFO : GET result: OK Apr 12 18:21:59.175982 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:21:59.180962 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:21:59.180962 ignition[1296]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:21:59.462292 ignition[1296]: INFO : GET result: OK Apr 12 18:21:59.726627 ignition[1296]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:21:59.731330 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:21:59.731330 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:21:59.731330 ignition[1296]: INFO : GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubectl: attempt #1 Apr 12 18:21:59.849547 ignition[1296]: INFO : GET result: OK Apr 12 18:22:00.431643 ignition[1296]: DEBUG : file matches expected sum of: b303598f3a65bbc366a7bfb4632d3b5cdd2d41b8a7973de80a99f8b1bb058299b57dc39b17a53eb7a54f1a0479ae4e2093fec675f1baff4613e14e0ed9d65c21 Apr 12 18:22:00.438999 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:22:00.438999 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:22:00.438999 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:22:00.452731 ignition[1296]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2573333908" Apr 12 18:22:00.460334 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1296) Apr 12 18:22:00.460374 ignition[1296]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2573333908": device or resource busy Apr 12 18:22:00.460374 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2573333908", trying btrfs: device or resource busy Apr 12 18:22:00.460374 ignition[1296]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2573333908" Apr 12 18:22:00.460374 ignition[1296]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2573333908" Apr 12 18:22:00.479055 ignition[1296]: INFO : op(3): [started] unmounting "/mnt/oem2573333908" Apr 12 18:22:00.481781 ignition[1296]: INFO : op(3): [finished] unmounting "/mnt/oem2573333908" Apr 12 18:22:00.481781 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:22:00.481781 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:22:00.481781 ignition[1296]: INFO : GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:22:00.482310 systemd[1]: mnt-oem2573333908.mount: Deactivated successfully. Apr 12 18:22:00.545626 ignition[1296]: INFO : GET result: OK Apr 12 18:22:01.119849 ignition[1296]: DEBUG : file matches expected sum of: 3e6beeb7794aa002604f0be43af0255e707846760508ebe98006ec72ae8d7a7cf2c14fd52bbcc5084f0e9366b992dc64341b1da646f1ce6e937fb762f880dc15 Apr 12 18:22:01.124590 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:22:01.124590 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:22:01.124590 ignition[1296]: INFO : GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:22:01.181753 ignition[1296]: INFO : GET result: OK Apr 12 18:22:02.490354 ignition[1296]: DEBUG : file matches expected sum of: ded47d757fac0279b1b784756fb54b3a5cb0180ce45833838b00d6d7c87578a985e4627503dd7ff734e5f577cf4752ae7daaa2b68e5934fd4617ea15e995f91b Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:22:02.496856 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:22:02.541014 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:22:02.541014 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:22:02.541014 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:22:02.541014 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:22:02.559741 ignition[1296]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem723001938" Apr 12 18:22:02.559741 ignition[1296]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem723001938": device or resource busy Apr 12 18:22:02.559741 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem723001938", trying btrfs: device or resource busy Apr 12 18:22:02.559741 ignition[1296]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem723001938" Apr 12 18:22:02.574499 ignition[1296]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem723001938" Apr 12 18:22:02.574499 ignition[1296]: INFO : op(6): [started] unmounting "/mnt/oem723001938" Apr 12 18:22:02.574499 ignition[1296]: INFO : op(6): [finished] unmounting "/mnt/oem723001938" Apr 12 18:22:02.574499 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:22:02.574499 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:22:02.574499 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:22:02.591206 systemd[1]: mnt-oem723001938.mount: Deactivated successfully. Apr 12 18:22:02.622241 ignition[1296]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3535782964" Apr 12 18:22:02.625270 ignition[1296]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3535782964": device or resource busy Apr 12 18:22:02.625270 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3535782964", trying btrfs: device or resource busy Apr 12 18:22:02.625270 ignition[1296]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3535782964" Apr 12 18:22:02.625270 ignition[1296]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3535782964" Apr 12 18:22:02.642260 ignition[1296]: INFO : op(9): [started] unmounting "/mnt/oem3535782964" Apr 12 18:22:02.642260 ignition[1296]: INFO : op(9): [finished] unmounting "/mnt/oem3535782964" Apr 12 18:22:02.647659 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:22:02.647659 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:22:02.647659 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:22:02.652049 systemd[1]: mnt-oem3535782964.mount: Deactivated successfully. Apr 12 18:22:02.680573 ignition[1296]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3286110438" Apr 12 18:22:02.683609 ignition[1296]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3286110438": device or resource busy Apr 12 18:22:02.683609 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3286110438", trying btrfs: device or resource busy Apr 12 18:22:02.683609 ignition[1296]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3286110438" Apr 12 18:22:02.683609 ignition[1296]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3286110438" Apr 12 18:22:02.697536 ignition[1296]: INFO : op(c): [started] unmounting "/mnt/oem3286110438" Apr 12 18:22:02.697536 ignition[1296]: INFO : op(c): [finished] unmounting "/mnt/oem3286110438" Apr 12 18:22:02.697536 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:22:02.697536 ignition[1296]: INFO : files: op(13): [started] processing unit "nvidia.service" Apr 12 18:22:02.697536 ignition[1296]: INFO : files: op(13): [finished] processing unit "nvidia.service" Apr 12 18:22:02.697536 ignition[1296]: INFO : files: op(14): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:22:02.697536 ignition[1296]: INFO : files: op(14): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:22:02.697536 ignition[1296]: INFO : files: op(15): [started] processing unit "amazon-ssm-agent.service" Apr 12 18:22:02.697536 ignition[1296]: INFO : files: op(15): op(16): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(15): op(16): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(15): [finished] processing unit "amazon-ssm-agent.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Apr 12 18:22:02.723446 ignition[1296]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(1d): [started] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(1d): [finished] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(20): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(21): [started] setting preset to enabled for "nvidia.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(21): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:22:02.763463 ignition[1296]: INFO : files: op(22): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:22:02.803721 ignition[1296]: INFO : files: op(22): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:22:02.812031 ignition[1296]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:22:02.812031 ignition[1296]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:22:02.812031 ignition[1296]: INFO : files: files passed Apr 12 18:22:02.812031 ignition[1296]: INFO : Ignition finished successfully Apr 12 18:22:02.822804 systemd[1]: Finished ignition-files.service. Apr 12 18:22:02.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.834233 kernel: audit: type=1130 audit(1712946122.825:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.837158 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:22:02.839252 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:22:02.840749 systemd[1]: Starting ignition-quench.service... Apr 12 18:22:02.858990 initrd-setup-root-after-ignition[1320]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:22:02.860676 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:22:02.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.866822 systemd[1]: Reached target ignition-complete.target. Apr 12 18:22:02.881898 kernel: audit: type=1130 audit(1712946122.863:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.877645 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:22:02.884635 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:22:02.886989 systemd[1]: Finished ignition-quench.service. Apr 12 18:22:02.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.905755 kernel: audit: type=1130 audit(1712946122.889:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.905833 kernel: audit: type=1131 audit(1712946122.889:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.915077 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:22:02.917351 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:22:02.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.921017 systemd[1]: Reached target initrd-fs.target. Apr 12 18:22:02.936637 kernel: audit: type=1130 audit(1712946122.919:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.936681 kernel: audit: type=1131 audit(1712946122.919:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.938505 systemd[1]: Reached target initrd.target. Apr 12 18:22:02.940191 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:22:02.941730 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:22:02.967650 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:22:02.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:02.984534 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:22:02.988067 kernel: audit: type=1130 audit(1712946122.975:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.006530 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:22:03.010175 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:22:03.013914 systemd[1]: Stopped target timers.target. Apr 12 18:22:03.017091 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:22:03.019286 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:22:03.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.022618 systemd[1]: Stopped target initrd.target. Apr 12 18:22:03.031124 kernel: audit: type=1131 audit(1712946123.021:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.032924 systemd[1]: Stopped target basic.target. Apr 12 18:22:03.036183 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:22:03.039936 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:22:03.043681 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:22:03.047453 systemd[1]: Stopped target remote-fs.target. Apr 12 18:22:03.050825 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:22:03.054397 systemd[1]: Stopped target sysinit.target. Apr 12 18:22:03.057675 systemd[1]: Stopped target local-fs.target. Apr 12 18:22:03.060966 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:22:03.064453 systemd[1]: Stopped target swap.target. Apr 12 18:22:03.067500 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:22:03.069698 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:22:03.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.073307 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:22:03.083673 kernel: audit: type=1131 audit(1712946123.071:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.083664 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:22:03.085797 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:22:03.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.089173 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:22:03.089424 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:22:03.097461 kernel: audit: type=1131 audit(1712946123.087:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.102563 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:22:03.104686 systemd[1]: Stopped ignition-files.service. Apr 12 18:22:03.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.109432 systemd[1]: Stopping ignition-mount.service... Apr 12 18:22:03.113920 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:22:03.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.115509 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:22:03.115848 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:22:03.121715 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:22:03.124855 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:22:03.135613 ignition[1334]: INFO : Ignition 2.14.0 Apr 12 18:22:03.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.143412 ignition[1334]: INFO : Stage: umount Apr 12 18:22:03.145548 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:22:03.147798 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:22:03.150682 ignition[1334]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:22:03.155103 ignition[1334]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:22:03.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.172602 ignition[1334]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:22:03.175552 ignition[1334]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:22:03.179025 ignition[1334]: INFO : PUT result: OK Apr 12 18:22:03.184387 ignition[1334]: INFO : umount: umount passed Apr 12 18:22:03.186177 ignition[1334]: INFO : Ignition finished successfully Apr 12 18:22:03.189915 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:22:03.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.190135 systemd[1]: Stopped ignition-mount.service. Apr 12 18:22:03.195166 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:22:03.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.195284 systemd[1]: Stopped ignition-disks.service. Apr 12 18:22:03.197552 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:22:03.197633 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:22:03.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.205535 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:22:03.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.205624 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:22:03.210180 systemd[1]: Stopped target network.target. Apr 12 18:22:03.211828 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:22:03.216881 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:22:03.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.222776 systemd[1]: Stopped target paths.target. Apr 12 18:22:03.224511 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:22:03.231342 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:22:03.234865 systemd[1]: Stopped target slices.target. Apr 12 18:22:03.234986 systemd[1]: Stopped target sockets.target. Apr 12 18:22:03.240943 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:22:03.241022 systemd[1]: Closed iscsid.socket. Apr 12 18:22:03.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.244072 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:22:03.244136 systemd[1]: Closed iscsiuio.socket. Apr 12 18:22:03.245576 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:22:03.245665 systemd[1]: Stopped ignition-setup.service. Apr 12 18:22:03.247558 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:22:03.249505 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:22:03.264665 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:22:03.265146 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:22:03.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.271570 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:22:03.271754 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:22:03.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.278847 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:22:03.280891 systemd-networkd[1141]: eth0: DHCPv6 lease lost Apr 12 18:22:03.280000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:22:03.283438 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:22:03.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.288380 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:22:03.288603 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:22:03.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.294000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:22:03.296004 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:22:03.296087 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:22:03.315193 systemd[1]: Stopping network-cleanup.service... Apr 12 18:22:03.318164 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:22:03.321977 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:22:03.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.325453 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:22:03.325558 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:22:03.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.337268 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:22:03.337385 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:22:03.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.345616 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:22:03.356778 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:22:03.357179 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:22:03.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.363455 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:22:03.363991 systemd[1]: Stopped network-cleanup.service. Apr 12 18:22:03.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.369005 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:22:03.369097 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:22:03.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.372348 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:22:03.372427 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:22:03.374199 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:22:03.374321 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:22:03.376631 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:22:03.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.376727 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:22:03.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.381489 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:22:03.381585 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:22:03.384770 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:22:03.395993 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:22:03.396113 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:22:03.398780 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:22:03.398877 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:22:03.413274 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:22:03.415141 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:22:03.435314 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:22:03.437488 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:22:03.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:03.442592 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:22:03.447499 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:22:03.464036 systemd[1]: Switching root. Apr 12 18:22:03.493865 iscsid[1146]: iscsid shutting down. Apr 12 18:22:03.497297 systemd-journald[268]: Received SIGTERM from PID 1 (systemd). Apr 12 18:22:03.497378 systemd-journald[268]: Journal stopped Apr 12 18:22:08.788081 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:22:08.788185 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:22:08.788261 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:22:08.788302 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:22:08.788333 kernel: SELinux: policy capability open_perms=1 Apr 12 18:22:08.788364 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:22:08.788395 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:22:08.788428 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:22:08.788459 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:22:08.788490 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:22:08.788521 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:22:08.788569 systemd[1]: Successfully loaded SELinux policy in 106.392ms. Apr 12 18:22:08.788636 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.126ms. Apr 12 18:22:08.788671 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:22:08.788706 systemd[1]: Detected virtualization amazon. Apr 12 18:22:08.788737 systemd[1]: Detected architecture arm64. Apr 12 18:22:08.788770 systemd[1]: Detected first boot. Apr 12 18:22:08.788808 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:22:08.788839 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:22:08.788872 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:22:08.788906 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:22:08.788939 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:22:08.788973 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:22:08.789018 kernel: kauditd_printk_skb: 47 callbacks suppressed Apr 12 18:22:08.789047 kernel: audit: type=1334 audit(1712946128.349:87): prog-id=12 op=LOAD Apr 12 18:22:08.789084 kernel: audit: type=1334 audit(1712946128.350:88): prog-id=3 op=UNLOAD Apr 12 18:22:08.789113 kernel: audit: type=1334 audit(1712946128.351:89): prog-id=13 op=LOAD Apr 12 18:22:08.789144 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:22:08.789180 kernel: audit: type=1334 audit(1712946128.353:90): prog-id=14 op=LOAD Apr 12 18:22:08.789226 systemd[1]: Stopped iscsiuio.service. Apr 12 18:22:08.789263 kernel: audit: type=1334 audit(1712946128.353:91): prog-id=4 op=UNLOAD Apr 12 18:22:08.789291 kernel: audit: type=1334 audit(1712946128.353:92): prog-id=5 op=UNLOAD Apr 12 18:22:08.789319 kernel: audit: type=1131 audit(1712946128.356:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.789349 kernel: audit: type=1334 audit(1712946128.361:94): prog-id=12 op=UNLOAD Apr 12 18:22:08.789380 kernel: audit: type=1131 audit(1712946128.382:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.789413 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:22:08.789448 systemd[1]: Stopped iscsid.service. Apr 12 18:22:08.789481 kernel: audit: type=1131 audit(1712946128.396:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.789511 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:22:08.789542 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:22:08.789574 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:22:08.789606 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:22:08.789638 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:22:08.789672 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:22:08.789704 systemd[1]: Created slice system-getty.slice. Apr 12 18:22:08.789736 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:22:08.789767 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:22:08.789800 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:22:08.791986 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:22:08.792051 systemd[1]: Created slice user.slice. Apr 12 18:22:08.792087 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:22:08.792118 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:22:08.792155 systemd[1]: Set up automount boot.automount. Apr 12 18:22:08.792187 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:22:08.792317 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:22:08.792354 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:22:08.792385 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:22:08.792419 systemd[1]: Reached target integritysetup.target. Apr 12 18:22:08.794271 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:22:08.794312 systemd[1]: Reached target remote-fs.target. Apr 12 18:22:08.794344 systemd[1]: Reached target slices.target. Apr 12 18:22:08.794380 systemd[1]: Reached target swap.target. Apr 12 18:22:08.794413 systemd[1]: Reached target torcx.target. Apr 12 18:22:08.794446 systemd[1]: Reached target veritysetup.target. Apr 12 18:22:08.794476 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:22:08.794508 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:22:08.794537 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:22:08.794569 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:22:08.794600 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:22:08.794630 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:22:08.794661 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:22:08.794697 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:22:08.794727 systemd[1]: Mounting media.mount... Apr 12 18:22:08.794758 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:22:08.794788 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:22:08.794818 systemd[1]: Mounting tmp.mount... Apr 12 18:22:08.794848 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:22:08.794882 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:22:08.794912 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:22:08.794944 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:22:08.794978 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:22:08.795008 systemd[1]: Starting modprobe@drm.service... Apr 12 18:22:08.795039 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:22:08.795068 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:22:08.795101 systemd[1]: Starting modprobe@loop.service... Apr 12 18:22:08.795131 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:22:08.795163 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:22:08.795194 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:22:08.795252 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:22:08.795284 kernel: fuse: init (API version 7.34) Apr 12 18:22:08.795315 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:22:08.795344 systemd[1]: Stopped systemd-journald.service. Apr 12 18:22:08.795376 systemd[1]: Starting systemd-journald.service... Apr 12 18:22:08.795405 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:22:08.795437 kernel: loop: module loaded Apr 12 18:22:08.795466 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:22:08.795495 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:22:08.795525 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:22:08.795559 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:22:08.795590 systemd[1]: Stopped verity-setup.service. Apr 12 18:22:08.795619 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:22:08.795649 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:22:08.795679 systemd[1]: Mounted media.mount. Apr 12 18:22:08.795708 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:22:08.795737 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:22:08.795766 systemd[1]: Mounted tmp.mount. Apr 12 18:22:08.795796 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:22:08.795833 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:22:08.795869 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:22:08.795902 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:22:08.795934 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:22:08.795969 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:22:08.796001 systemd[1]: Finished modprobe@drm.service. Apr 12 18:22:08.796031 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:22:08.796061 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:22:08.796090 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:22:08.796124 systemd-journald[1449]: Journal started Apr 12 18:22:08.796238 systemd-journald[1449]: Runtime Journal (/run/log/journal/ec253655aa92795feba433490981cb5f) is 8.0M, max 75.4M, 67.4M free. Apr 12 18:22:04.178000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:22:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:22:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:22:04.358000 audit: BPF prog-id=10 op=LOAD Apr 12 18:22:04.358000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:22:04.358000 audit: BPF prog-id=11 op=LOAD Apr 12 18:22:04.358000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:22:04.533000 audit[1367]: AVC avc: denied { associate } for pid=1367 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:22:04.533000 audit[1367]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1350 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:04.533000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:22:04.537000 audit[1367]: AVC avc: denied { associate } for pid=1367 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:22:04.537000 audit[1367]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1350 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:04.537000 audit: CWD cwd="/" Apr 12 18:22:04.537000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:04.537000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:04.537000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:22:08.349000 audit: BPF prog-id=12 op=LOAD Apr 12 18:22:08.350000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:22:08.351000 audit: BPF prog-id=13 op=LOAD Apr 12 18:22:08.353000 audit: BPF prog-id=14 op=LOAD Apr 12 18:22:08.353000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:22:08.353000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:22:08.806534 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:22:08.806586 systemd[1]: Started systemd-journald.service. Apr 12 18:22:08.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.361000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:22:08.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.677000 audit: BPF prog-id=15 op=LOAD Apr 12 18:22:08.677000 audit: BPF prog-id=16 op=LOAD Apr 12 18:22:08.677000 audit: BPF prog-id=17 op=LOAD Apr 12 18:22:08.677000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:22:08.677000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:22:08.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.777000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:22:08.777000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc53975d0 a2=4000 a3=1 items=0 ppid=1 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:08.777000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:22:08.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:04.521640 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:22:08.344890 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:22:04.522340 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:22:08.357147 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:22:04.522394 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:22:08.806465 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:22:04.522458 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:22:08.806748 systemd[1]: Finished modprobe@loop.service. Apr 12 18:22:04.522484 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:22:08.809022 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:22:04.522542 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:22:08.811470 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:22:04.522572 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:22:08.813947 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:22:04.522962 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:22:08.816609 systemd[1]: Reached target network-pre.target. Apr 12 18:22:04.523036 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:22:08.820617 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:22:04.523071 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:22:08.829274 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:22:04.524961 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:22:08.834464 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:22:04.525040 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:22:04.525084 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:22:04.525125 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:22:04.525175 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:22:04.525238 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:22:07.500603 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:07Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:22:07.501148 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:07Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:22:07.501413 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:07Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:22:07.501850 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:07Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:22:07.501956 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:07Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:22:07.502088 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:07Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:22:08.840943 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:22:08.845001 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:22:08.847366 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:22:08.849708 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:22:08.851471 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:22:08.856901 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:22:08.867875 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:22:08.870047 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:22:08.889715 systemd-journald[1449]: Time spent on flushing to /var/log/journal/ec253655aa92795feba433490981cb5f is 63.648ms for 1165 entries. Apr 12 18:22:08.889715 systemd-journald[1449]: System Journal (/var/log/journal/ec253655aa92795feba433490981cb5f) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:22:09.024882 systemd-journald[1449]: Received client request to flush runtime journal. Apr 12 18:22:08.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:08.918454 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:22:08.920563 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:22:08.923081 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:22:08.925955 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:22:08.930043 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:22:09.028165 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:22:09.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:09.055616 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:22:09.059685 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:22:09.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:09.074201 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:22:09.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:09.078342 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:22:09.100445 udevadm[1489]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:22:09.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:09.145621 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:22:09.841763 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:22:09.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:09.843000 audit: BPF prog-id=18 op=LOAD Apr 12 18:22:09.843000 audit: BPF prog-id=19 op=LOAD Apr 12 18:22:09.843000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:22:09.843000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:22:09.846187 systemd[1]: Starting systemd-udevd.service... Apr 12 18:22:09.885123 systemd-udevd[1490]: Using default interface naming scheme 'v252'. Apr 12 18:22:09.935104 systemd[1]: Started systemd-udevd.service. Apr 12 18:22:09.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:09.937000 audit: BPF prog-id=20 op=LOAD Apr 12 18:22:09.940447 systemd[1]: Starting systemd-networkd.service... Apr 12 18:22:09.947000 audit: BPF prog-id=21 op=LOAD Apr 12 18:22:09.948000 audit: BPF prog-id=22 op=LOAD Apr 12 18:22:09.948000 audit: BPF prog-id=23 op=LOAD Apr 12 18:22:09.950617 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:22:10.043963 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:22:10.058526 systemd[1]: Started systemd-userdbd.service. Apr 12 18:22:10.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.092952 (udev-worker)[1492]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:22:10.204850 systemd-networkd[1493]: lo: Link UP Apr 12 18:22:10.204871 systemd-networkd[1493]: lo: Gained carrier Apr 12 18:22:10.205822 systemd-networkd[1493]: Enumeration completed Apr 12 18:22:10.206018 systemd[1]: Started systemd-networkd.service. Apr 12 18:22:10.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.206032 systemd-networkd[1493]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:22:10.210051 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:22:10.217307 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:22:10.219803 systemd-networkd[1493]: eth0: Link UP Apr 12 18:22:10.220110 systemd-networkd[1493]: eth0: Gained carrier Apr 12 18:22:10.229442 systemd-networkd[1493]: eth0: DHCPv4 address 172.31.28.18/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:22:10.248272 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1524) Apr 12 18:22:10.414986 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:22:10.417750 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:22:10.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.421866 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:22:10.443947 lvm[1609]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:22:10.478802 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:22:10.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.480966 systemd[1]: Reached target cryptsetup.target. Apr 12 18:22:10.485065 systemd[1]: Starting lvm2-activation.service... Apr 12 18:22:10.493674 lvm[1610]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:22:10.532267 systemd[1]: Finished lvm2-activation.service. Apr 12 18:22:10.534447 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:22:10.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.536422 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:22:10.536471 systemd[1]: Reached target local-fs.target. Apr 12 18:22:10.538586 systemd[1]: Reached target machines.target. Apr 12 18:22:10.542917 systemd[1]: Starting ldconfig.service... Apr 12 18:22:10.545389 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:22:10.545544 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:22:10.547930 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:22:10.551857 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:22:10.558282 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:22:10.560386 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:22:10.560601 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:22:10.563634 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:22:10.580167 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1612 (bootctl) Apr 12 18:22:10.582808 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:22:10.608623 systemd-tmpfiles[1615]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:22:10.613295 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:22:10.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.624603 systemd-tmpfiles[1615]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:22:10.630025 systemd-tmpfiles[1615]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:22:10.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.635902 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:22:10.636972 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:22:10.691146 systemd-fsck[1620]: fsck.fat 4.2 (2021-01-31) Apr 12 18:22:10.691146 systemd-fsck[1620]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Apr 12 18:22:10.699075 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:22:10.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.703889 systemd[1]: Mounting boot.mount... Apr 12 18:22:10.717190 systemd[1]: Mounted boot.mount. Apr 12 18:22:10.740004 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:22:10.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.953350 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:22:10.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.957984 systemd[1]: Starting audit-rules.service... Apr 12 18:22:10.962318 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:22:10.967724 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:22:10.971000 audit: BPF prog-id=24 op=LOAD Apr 12 18:22:10.975181 systemd[1]: Starting systemd-resolved.service... Apr 12 18:22:10.977000 audit: BPF prog-id=25 op=LOAD Apr 12 18:22:10.983601 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:22:10.988134 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:22:11.004850 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:22:11.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:11.007370 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:22:11.023000 audit[1642]: SYSTEM_BOOT pid=1642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:22:11.029077 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:22:11.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:11.070249 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:22:11.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:11.123000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:22:11.123000 audit[1654]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd831a950 a2=420 a3=0 items=0 ppid=1634 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:11.123000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:22:11.125326 augenrules[1654]: No rules Apr 12 18:22:11.126784 systemd[1]: Finished audit-rules.service. Apr 12 18:22:11.144369 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:22:11.146483 systemd[1]: Reached target time-set.target. Apr 12 18:22:11.184773 systemd-resolved[1638]: Positive Trust Anchors: Apr 12 18:22:11.185421 systemd-resolved[1638]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:22:11.185602 systemd-resolved[1638]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:22:11.195196 ldconfig[1611]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:22:11.204687 systemd[1]: Finished ldconfig.service. Apr 12 18:22:11.208703 systemd[1]: Starting systemd-update-done.service... Apr 12 18:22:11.226169 systemd-resolved[1638]: Defaulting to hostname 'linux'. Apr 12 18:22:11.229519 systemd[1]: Started systemd-resolved.service. Apr 12 18:22:11.231915 systemd[1]: Finished systemd-update-done.service. Apr 12 18:22:11.233921 systemd[1]: Reached target network.target. Apr 12 18:22:11.235623 systemd[1]: Reached target nss-lookup.target. Apr 12 18:22:11.237402 systemd[1]: Reached target sysinit.target. Apr 12 18:22:11.239184 systemd[1]: Started motdgen.path. Apr 12 18:22:11.240704 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:22:11.243197 systemd[1]: Started logrotate.timer. Apr 12 18:22:11.244951 systemd[1]: Started mdadm.timer. Apr 12 18:22:11.246360 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:22:11.248087 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:22:11.248138 systemd[1]: Reached target paths.target. Apr 12 18:22:11.249641 systemd[1]: Reached target timers.target. Apr 12 18:22:11.251879 systemd[1]: Listening on dbus.socket. Apr 12 18:22:11.255323 systemd[1]: Starting docker.socket... Apr 12 18:22:11.261601 systemd[1]: Listening on sshd.socket. Apr 12 18:22:11.263646 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:22:11.264712 systemd[1]: Listening on docker.socket. Apr 12 18:22:11.266708 systemd[1]: Reached target sockets.target. Apr 12 18:22:11.268882 systemd[1]: Reached target basic.target. Apr 12 18:22:11.271097 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:22:11.271349 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:22:11.273543 systemd[1]: Starting containerd.service... Apr 12 18:22:11.277614 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:22:11.282348 systemd[1]: Starting dbus.service... Apr 12 18:22:11.286276 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:22:11.290833 systemd[1]: Starting extend-filesystems.service... Apr 12 18:22:11.295536 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:22:11.297850 systemd[1]: Starting motdgen.service... Apr 12 18:22:11.345318 jq[1666]: false Apr 12 18:22:11.301747 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:22:11.309441 systemd[1]: Starting prepare-critools.service... Apr 12 18:22:11.313426 systemd[1]: Starting prepare-helm.service... Apr 12 18:22:11.317558 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:22:11.322941 systemd[1]: Starting sshd-keygen.service... Apr 12 18:22:11.332453 systemd[1]: Starting systemd-logind.service... Apr 12 18:22:11.334104 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:22:11.334248 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:22:11.335166 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:22:11.339466 systemd[1]: Starting update-engine.service... Apr 12 18:22:11.350574 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:22:11.357401 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:22:11.357784 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:22:11.365194 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:22:11.365627 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:22:11.377661 systemd[1]: Created slice system-sshd.slice. Apr 12 18:22:11.393770 jq[1680]: true Apr 12 18:22:11.425921 tar[1683]: ./ Apr 12 18:22:11.425921 tar[1683]: ./loopback Apr 12 18:22:11.428699 systemd-timesyncd[1639]: Contacted time server 69.10.223.130:123 (0.flatcar.pool.ntp.org). Apr 12 18:22:11.428817 systemd-timesyncd[1639]: Initial clock synchronization to Fri 2024-04-12 18:22:11.447195 UTC. Apr 12 18:22:11.430034 tar[1684]: crictl Apr 12 18:22:11.432689 tar[1685]: linux-arm64/helm Apr 12 18:22:11.433351 dbus-daemon[1665]: [system] SELinux support is enabled Apr 12 18:22:11.439235 jq[1689]: true Apr 12 18:22:11.442598 systemd[1]: Started dbus.service. Apr 12 18:22:11.447624 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:22:11.447695 systemd[1]: Reached target system-config.target. Apr 12 18:22:11.449620 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:22:11.449668 systemd[1]: Reached target user-config.target. Apr 12 18:22:11.462174 dbus-daemon[1665]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1493 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 18:22:11.466687 extend-filesystems[1667]: Found nvme0n1 Apr 12 18:22:11.473391 extend-filesystems[1667]: Found nvme0n1p1 Apr 12 18:22:11.479129 extend-filesystems[1667]: Found nvme0n1p2 Apr 12 18:22:11.480955 extend-filesystems[1667]: Found nvme0n1p3 Apr 12 18:22:11.486554 dbus-daemon[1665]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:22:11.486869 extend-filesystems[1667]: Found usr Apr 12 18:22:11.489127 extend-filesystems[1667]: Found nvme0n1p4 Apr 12 18:22:11.494147 extend-filesystems[1667]: Found nvme0n1p6 Apr 12 18:22:11.495957 extend-filesystems[1667]: Found nvme0n1p7 Apr 12 18:22:11.500535 systemd[1]: Starting systemd-hostnamed.service... Apr 12 18:22:11.502836 extend-filesystems[1667]: Found nvme0n1p9 Apr 12 18:22:11.506373 extend-filesystems[1667]: Checking size of /dev/nvme0n1p9 Apr 12 18:22:11.517468 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:22:11.517858 systemd[1]: Finished motdgen.service. Apr 12 18:22:11.579455 extend-filesystems[1667]: Resized partition /dev/nvme0n1p9 Apr 12 18:22:11.590666 extend-filesystems[1722]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:22:11.619363 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Apr 12 18:22:11.620472 update_engine[1679]: I0412 18:22:11.619701 1679 main.cc:92] Flatcar Update Engine starting Apr 12 18:22:11.657209 systemd[1]: Started update-engine.service. Apr 12 18:22:11.673089 update_engine[1679]: I0412 18:22:11.657342 1679 update_check_scheduler.cc:74] Next update check in 4m19s Apr 12 18:22:11.662035 systemd[1]: Started locksmithd.service. Apr 12 18:22:11.684253 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Apr 12 18:22:11.712677 extend-filesystems[1722]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 18:22:11.712677 extend-filesystems[1722]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:22:11.712677 extend-filesystems[1722]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Apr 12 18:22:11.734770 bash[1726]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:22:11.720277 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:22:11.736913 extend-filesystems[1667]: Resized filesystem in /dev/nvme0n1p9 Apr 12 18:22:11.739627 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:22:11.739985 systemd[1]: Finished extend-filesystems.service. Apr 12 18:22:11.744139 env[1686]: time="2024-04-12T18:22:11.744024147Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:22:11.767409 tar[1683]: ./bandwidth Apr 12 18:22:11.811872 systemd-logind[1678]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 18:22:11.840807 systemd-logind[1678]: New seat seat0. Apr 12 18:22:11.844067 systemd[1]: Started systemd-logind.service. Apr 12 18:22:11.946521 env[1686]: time="2024-04-12T18:22:11.946428448Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:22:11.957582 env[1686]: time="2024-04-12T18:22:11.957525760Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:11.960892 env[1686]: time="2024-04-12T18:22:11.960820396Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:22:11.961432 env[1686]: time="2024-04-12T18:22:11.961391692Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:11.964766 env[1686]: time="2024-04-12T18:22:11.964624996Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:22:11.968341 env[1686]: time="2024-04-12T18:22:11.968284876Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:11.968539 env[1686]: time="2024-04-12T18:22:11.968505460Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:22:11.968670 env[1686]: time="2024-04-12T18:22:11.968640592Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:11.968971 env[1686]: time="2024-04-12T18:22:11.968940676Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:11.969612 env[1686]: time="2024-04-12T18:22:11.969574960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:11.970014 env[1686]: time="2024-04-12T18:22:11.969955384Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:22:11.970973 env[1686]: time="2024-04-12T18:22:11.970929148Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:22:11.977350 env[1686]: time="2024-04-12T18:22:11.977291680Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:22:11.977567 env[1686]: time="2024-04-12T18:22:11.977537920Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:22:11.991374 env[1686]: time="2024-04-12T18:22:11.991316392Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:22:11.991588 env[1686]: time="2024-04-12T18:22:11.991556812Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:22:11.991717 env[1686]: time="2024-04-12T18:22:11.991685224Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:22:11.991897 env[1686]: time="2024-04-12T18:22:11.991861888Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.992124 env[1686]: time="2024-04-12T18:22:11.992087476Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.992317 env[1686]: time="2024-04-12T18:22:11.992283328Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.992451 env[1686]: time="2024-04-12T18:22:11.992420116Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.993124 env[1686]: time="2024-04-12T18:22:11.993065968Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.993342 env[1686]: time="2024-04-12T18:22:11.993308668Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.993471 env[1686]: time="2024-04-12T18:22:11.993440212Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.993629 env[1686]: time="2024-04-12T18:22:11.993598468Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.993755 env[1686]: time="2024-04-12T18:22:11.993725356Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:22:11.994078 env[1686]: time="2024-04-12T18:22:11.994045516Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:22:11.994421 env[1686]: time="2024-04-12T18:22:11.994388440Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:22:11.994944 env[1686]: time="2024-04-12T18:22:11.994903480Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:22:11.995114 env[1686]: time="2024-04-12T18:22:11.995080828Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.995286 env[1686]: time="2024-04-12T18:22:11.995251468Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:22:11.995565 env[1686]: time="2024-04-12T18:22:11.995526544Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.995713 env[1686]: time="2024-04-12T18:22:11.995681380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.995837 env[1686]: time="2024-04-12T18:22:11.995808232Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.995954 env[1686]: time="2024-04-12T18:22:11.995925556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.996076 env[1686]: time="2024-04-12T18:22:11.996046528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.996198 env[1686]: time="2024-04-12T18:22:11.996168196Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.996464 env[1686]: time="2024-04-12T18:22:11.996430816Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.996616 env[1686]: time="2024-04-12T18:22:11.996582796Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.996763 env[1686]: time="2024-04-12T18:22:11.996733036Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:22:11.997162 env[1686]: time="2024-04-12T18:22:11.997123648Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.999349 env[1686]: time="2024-04-12T18:22:11.999296536Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.999572 env[1686]: time="2024-04-12T18:22:11.999538468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:22:11.999720 env[1686]: time="2024-04-12T18:22:11.999689584Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:22:11.999852 env[1686]: time="2024-04-12T18:22:11.999818080Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:22:11.999965 env[1686]: time="2024-04-12T18:22:11.999936136Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:22:12.003433 env[1686]: time="2024-04-12T18:22:12.003373011Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:22:12.003714 env[1686]: time="2024-04-12T18:22:12.003667944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:22:12.005991 env[1686]: time="2024-04-12T18:22:12.005779539Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:22:12.007919 env[1686]: time="2024-04-12T18:22:12.006000561Z" level=info msg="Connect containerd service" Apr 12 18:22:12.007919 env[1686]: time="2024-04-12T18:22:12.006105179Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:22:12.008086 env[1686]: time="2024-04-12T18:22:12.007984124Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:22:12.009139 env[1686]: time="2024-04-12T18:22:12.008990046Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:22:12.009348 env[1686]: time="2024-04-12T18:22:12.009201432Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:22:12.009472 systemd[1]: Started containerd.service. Apr 12 18:22:12.012838 env[1686]: time="2024-04-12T18:22:12.009473838Z" level=info msg="Start subscribing containerd event" Apr 12 18:22:12.012838 env[1686]: time="2024-04-12T18:22:12.012350078Z" level=info msg="Start recovering state" Apr 12 18:22:12.012838 env[1686]: time="2024-04-12T18:22:12.012472032Z" level=info msg="Start event monitor" Apr 12 18:22:12.012838 env[1686]: time="2024-04-12T18:22:12.012513925Z" level=info msg="Start snapshots syncer" Apr 12 18:22:12.012838 env[1686]: time="2024-04-12T18:22:12.012538434Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:22:12.012838 env[1686]: time="2024-04-12T18:22:12.012557969Z" level=info msg="Start streaming server" Apr 12 18:22:12.016906 dbus-daemon[1665]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 18:22:12.017156 systemd[1]: Started systemd-hostnamed.service. Apr 12 18:22:12.020192 dbus-daemon[1665]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1706 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 18:22:12.024978 systemd[1]: Starting polkit.service... Apr 12 18:22:12.057662 env[1686]: time="2024-04-12T18:22:12.057607859Z" level=info msg="containerd successfully booted in 0.368715s" Apr 12 18:22:12.062536 polkitd[1776]: Started polkitd version 121 Apr 12 18:22:12.093477 polkitd[1776]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 18:22:12.093773 polkitd[1776]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 18:22:12.098781 polkitd[1776]: Finished loading, compiling and executing 2 rules Apr 12 18:22:12.103062 dbus-daemon[1665]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 18:22:12.103395 systemd[1]: Started polkit.service. Apr 12 18:22:12.106370 polkitd[1776]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 18:22:12.126413 tar[1683]: ./ptp Apr 12 18:22:12.141830 systemd-hostnamed[1706]: Hostname set to (transient) Apr 12 18:22:12.142105 systemd-resolved[1638]: System hostname changed to 'ip-172-31-28-18'. Apr 12 18:22:12.239458 systemd-networkd[1493]: eth0: Gained IPv6LL Apr 12 18:22:12.243208 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:22:12.245869 systemd[1]: Reached target network-online.target. Apr 12 18:22:12.250242 systemd[1]: Started amazon-ssm-agent.service. Apr 12 18:22:12.254852 systemd[1]: Started nvidia.service. Apr 12 18:22:12.461878 coreos-metadata[1664]: Apr 12 18:22:12.461 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Apr 12 18:22:12.473183 coreos-metadata[1664]: Apr 12 18:22:12.472 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Apr 12 18:22:12.474298 coreos-metadata[1664]: Apr 12 18:22:12.474 INFO Fetch successful Apr 12 18:22:12.474298 coreos-metadata[1664]: Apr 12 18:22:12.474 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Apr 12 18:22:12.476234 coreos-metadata[1664]: Apr 12 18:22:12.476 INFO Fetch successful Apr 12 18:22:12.481383 unknown[1664]: wrote ssh authorized keys file for user: core Apr 12 18:22:12.483589 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:22:12.524556 update-ssh-keys[1831]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:22:12.526005 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:22:12.569310 amazon-ssm-agent[1812]: 2024/04/12 18:22:12 Failed to load instance info from vault. RegistrationKey does not exist. Apr 12 18:22:12.585832 amazon-ssm-agent[1812]: Initializing new seelog logger Apr 12 18:22:12.586774 amazon-ssm-agent[1812]: New Seelog Logger Creation Complete Apr 12 18:22:12.587073 amazon-ssm-agent[1812]: 2024/04/12 18:22:12 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:22:12.587486 amazon-ssm-agent[1812]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:22:12.588257 amazon-ssm-agent[1812]: 2024/04/12 18:22:12 processing appconfig overrides Apr 12 18:22:12.591898 tar[1683]: ./vlan Apr 12 18:22:12.809860 tar[1683]: ./host-device Apr 12 18:22:12.983743 tar[1683]: ./tuning Apr 12 18:22:13.126957 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Create new startup processor Apr 12 18:22:13.132201 tar[1683]: ./vrf Apr 12 18:22:13.164004 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [LongRunningPluginsManager] registered plugins: {} Apr 12 18:22:13.164370 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Initializing bookkeeping folders Apr 12 18:22:13.167236 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO removing the completed state files Apr 12 18:22:13.170396 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Initializing bookkeeping folders for long running plugins Apr 12 18:22:13.170586 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Apr 12 18:22:13.170719 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Initializing healthcheck folders for long running plugins Apr 12 18:22:13.170849 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Initializing locations for inventory plugin Apr 12 18:22:13.171002 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Initializing default location for custom inventory Apr 12 18:22:13.171133 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Initializing default location for file inventory Apr 12 18:22:13.171283 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Initializing default location for role inventory Apr 12 18:22:13.171414 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Init the cloudwatchlogs publisher Apr 12 18:22:13.171547 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:runPowerShellScript Apr 12 18:22:13.171678 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:downloadContent Apr 12 18:22:13.171809 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:runDocument Apr 12 18:22:13.171954 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:softwareInventory Apr 12 18:22:13.172085 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:updateSsmAgent Apr 12 18:22:13.172228 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:configureDocker Apr 12 18:22:13.172357 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:runDockerAction Apr 12 18:22:13.172488 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:refreshAssociation Apr 12 18:22:13.172637 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform independent plugin aws:configurePackage Apr 12 18:22:13.172898 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Successfully loaded platform dependent plugin aws:runShellScript Apr 12 18:22:13.173023 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Apr 12 18:22:13.173273 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO OS: linux, Arch: arm64 Apr 12 18:22:13.177127 amazon-ssm-agent[1812]: datastore file /var/lib/amazon/ssm/i-0dd24e301e22d7e5d/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Apr 12 18:22:13.249247 tar[1683]: ./sbr Apr 12 18:22:13.258696 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] Starting session document processing engine... Apr 12 18:22:13.353900 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] [EngineProcessor] Starting Apr 12 18:22:13.374785 tar[1683]: ./tap Apr 12 18:22:13.448377 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Apr 12 18:22:13.514884 tar[1683]: ./dhcp Apr 12 18:22:13.542761 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0dd24e301e22d7e5d, requestId: 2a6b42ef-be38-44ec-8854-387f887b86a3 Apr 12 18:22:13.637518 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] Starting document processing engine... Apr 12 18:22:13.732514 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] [EngineProcessor] Starting Apr 12 18:22:13.749665 tar[1685]: linux-arm64/LICENSE Apr 12 18:22:13.749665 tar[1685]: linux-arm64/README.md Apr 12 18:22:13.758909 systemd[1]: Finished prepare-critools.service. Apr 12 18:22:13.766773 systemd[1]: Finished prepare-helm.service. Apr 12 18:22:13.813023 tar[1683]: ./static Apr 12 18:22:13.827669 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Apr 12 18:22:13.860502 tar[1683]: ./firewall Apr 12 18:22:13.922934 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] Starting message polling Apr 12 18:22:13.930624 tar[1683]: ./macvlan Apr 12 18:22:13.994683 tar[1683]: ./dummy Apr 12 18:22:14.018566 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] Starting send replies to MDS Apr 12 18:22:14.059034 tar[1683]: ./bridge Apr 12 18:22:14.114227 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [instanceID=i-0dd24e301e22d7e5d] Starting association polling Apr 12 18:22:14.129103 tar[1683]: ./ipvlan Apr 12 18:22:14.191768 tar[1683]: ./portmap Apr 12 18:22:14.210141 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Apr 12 18:22:14.251814 tar[1683]: ./host-local Apr 12 18:22:14.307205 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] [Association] Launching response handler Apr 12 18:22:14.325307 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:22:14.403315 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Apr 12 18:22:14.410127 locksmithd[1734]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:22:14.499518 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Apr 12 18:22:14.596320 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Apr 12 18:22:14.693139 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] listening reply. Apr 12 18:22:14.790303 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [HealthCheck] HealthCheck reporting agent health. Apr 12 18:22:14.887678 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [OfflineService] Starting document processing engine... Apr 12 18:22:14.985054 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [OfflineService] [EngineProcessor] Starting Apr 12 18:22:15.082750 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [OfflineService] [EngineProcessor] Initial processing Apr 12 18:22:15.128081 sshd_keygen[1693]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:22:15.163704 systemd[1]: Finished sshd-keygen.service. Apr 12 18:22:15.168248 systemd[1]: Starting issuegen.service... Apr 12 18:22:15.172168 systemd[1]: Started sshd@0-172.31.28.18:22-139.178.89.65:53198.service. Apr 12 18:22:15.180744 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [OfflineService] Starting message polling Apr 12 18:22:15.184659 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:22:15.185016 systemd[1]: Finished issuegen.service. Apr 12 18:22:15.189674 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:22:15.204526 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:22:15.209165 systemd[1]: Started getty@tty1.service. Apr 12 18:22:15.213801 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:22:15.216086 systemd[1]: Reached target getty.target. Apr 12 18:22:15.217914 systemd[1]: Reached target multi-user.target. Apr 12 18:22:15.222329 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:22:15.236976 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:22:15.237389 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:22:15.239653 systemd[1]: Startup finished in 1.120s (kernel) + 11.475s (initrd) + 11.171s (userspace) = 23.767s. Apr 12 18:22:15.278817 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [OfflineService] Starting send replies to MDS Apr 12 18:22:15.377079 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [LongRunningPluginsManager] starting long running plugin manager Apr 12 18:22:15.411899 sshd[1876]: Accepted publickey for core from 139.178.89.65 port 53198 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:15.414837 sshd[1876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:15.432720 systemd[1]: Created slice user-500.slice. Apr 12 18:22:15.436480 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:22:15.445242 systemd-logind[1678]: New session 1 of user core. Apr 12 18:22:15.455039 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:22:15.458099 systemd[1]: Starting user@500.service... Apr 12 18:22:15.464544 (systemd)[1885]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:15.475575 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Apr 12 18:22:15.574266 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Apr 12 18:22:15.649437 systemd[1885]: Queued start job for default target default.target. Apr 12 18:22:15.650922 systemd[1885]: Reached target paths.target. Apr 12 18:22:15.651118 systemd[1885]: Reached target sockets.target. Apr 12 18:22:15.651541 systemd[1885]: Reached target timers.target. Apr 12 18:22:15.651753 systemd[1885]: Reached target basic.target. Apr 12 18:22:15.652052 systemd[1885]: Reached target default.target. Apr 12 18:22:15.652143 systemd[1]: Started user@500.service. Apr 12 18:22:15.652361 systemd[1885]: Startup finished in 175ms. Apr 12 18:22:15.655672 systemd[1]: Started session-1.scope. Apr 12 18:22:15.673282 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [StartupProcessor] Executing startup processor tasks Apr 12 18:22:15.772255 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Apr 12 18:22:15.802732 systemd[1]: Started sshd@1-172.31.28.18:22-139.178.89.65:53204.service. Apr 12 18:22:15.871534 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Apr 12 18:22:15.971064 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.3 Apr 12 18:22:15.979419 sshd[1894]: Accepted publickey for core from 139.178.89.65 port 53204 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:15.981833 sshd[1894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:15.990517 systemd[1]: Started session-2.scope. Apr 12 18:22:15.991441 systemd-logind[1678]: New session 2 of user core. Apr 12 18:22:16.070679 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0dd24e301e22d7e5d?role=subscribe&stream=input Apr 12 18:22:16.123919 sshd[1894]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:16.130112 systemd[1]: sshd@1-172.31.28.18:22-139.178.89.65:53204.service: Deactivated successfully. Apr 12 18:22:16.130938 systemd-logind[1678]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:22:16.131599 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:22:16.134019 systemd-logind[1678]: Removed session 2. Apr 12 18:22:16.152457 systemd[1]: Started sshd@2-172.31.28.18:22-139.178.89.65:53214.service. Apr 12 18:22:16.170519 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0dd24e301e22d7e5d?role=subscribe&stream=input Apr 12 18:22:16.270614 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] Starting receiving message from control channel Apr 12 18:22:16.323767 sshd[1900]: Accepted publickey for core from 139.178.89.65 port 53214 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:16.326139 sshd[1900]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:16.334282 systemd-logind[1678]: New session 3 of user core. Apr 12 18:22:16.335499 systemd[1]: Started session-3.scope. Apr 12 18:22:16.370802 amazon-ssm-agent[1812]: 2024-04-12 18:22:13 INFO [MessageGatewayService] [EngineProcessor] Initial processing Apr 12 18:22:16.457358 sshd[1900]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:16.462001 systemd[1]: sshd@2-172.31.28.18:22-139.178.89.65:53214.service: Deactivated successfully. Apr 12 18:22:16.463252 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:22:16.464409 systemd-logind[1678]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:22:16.465887 systemd-logind[1678]: Removed session 3. Apr 12 18:22:16.484488 systemd[1]: Started sshd@3-172.31.28.18:22-139.178.89.65:53224.service. Apr 12 18:22:16.653876 sshd[1906]: Accepted publickey for core from 139.178.89.65 port 53224 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:16.656529 sshd[1906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:16.666178 systemd[1]: Started session-4.scope. Apr 12 18:22:16.667332 systemd-logind[1678]: New session 4 of user core. Apr 12 18:22:16.805735 sshd[1906]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:16.811565 systemd[1]: sshd@3-172.31.28.18:22-139.178.89.65:53224.service: Deactivated successfully. Apr 12 18:22:16.812830 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:22:16.813985 systemd-logind[1678]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:22:16.817022 systemd-logind[1678]: Removed session 4. Apr 12 18:22:16.834280 systemd[1]: Started sshd@4-172.31.28.18:22-139.178.89.65:53226.service. Apr 12 18:22:17.009585 sshd[1912]: Accepted publickey for core from 139.178.89.65 port 53226 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:17.012619 sshd[1912]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:17.022420 systemd[1]: Started session-5.scope. Apr 12 18:22:17.023159 systemd-logind[1678]: New session 5 of user core. Apr 12 18:22:17.141079 sudo[1915]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:22:17.142199 sudo[1915]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:22:17.160552 dbus-daemon[1665]: avc: received setenforce notice (enforcing=1) Apr 12 18:22:17.163677 sudo[1915]: pam_unix(sudo:session): session closed for user root Apr 12 18:22:17.188821 sshd[1912]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:17.193935 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:22:17.195112 systemd[1]: sshd@4-172.31.28.18:22-139.178.89.65:53226.service: Deactivated successfully. Apr 12 18:22:17.196849 systemd-logind[1678]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:22:17.198891 systemd-logind[1678]: Removed session 5. Apr 12 18:22:17.216751 systemd[1]: Started sshd@5-172.31.28.18:22-139.178.89.65:59862.service. Apr 12 18:22:17.385048 sshd[1919]: Accepted publickey for core from 139.178.89.65 port 59862 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:17.388092 sshd[1919]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:17.396335 systemd[1]: Started session-6.scope. Apr 12 18:22:17.398361 systemd-logind[1678]: New session 6 of user core. Apr 12 18:22:17.503654 sudo[1923]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:22:17.504637 sudo[1923]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:22:17.509936 sudo[1923]: pam_unix(sudo:session): session closed for user root Apr 12 18:22:17.519099 sudo[1922]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:22:17.519633 sudo[1922]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:22:17.536646 systemd[1]: Stopping audit-rules.service... Apr 12 18:22:17.537000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:22:17.539504 auditctl[1926]: No rules Apr 12 18:22:17.540838 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 18:22:17.540922 kernel: audit: type=1305 audit(1712946137.537:161): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:22:17.546514 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:22:17.537000 audit[1926]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffbc41100 a2=420 a3=0 items=0 ppid=1 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:17.558705 kernel: audit: type=1300 audit(1712946137.537:161): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffbc41100 a2=420 a3=0 items=0 ppid=1 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:17.546905 systemd[1]: Stopped audit-rules.service. Apr 12 18:22:17.556871 systemd[1]: Starting audit-rules.service... Apr 12 18:22:17.537000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:22:17.563198 kernel: audit: type=1327 audit(1712946137.537:161): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:22:17.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.571319 kernel: audit: type=1131 audit(1712946137.545:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.588015 augenrules[1943]: No rules Apr 12 18:22:17.589683 systemd[1]: Finished audit-rules.service. Apr 12 18:22:17.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.593546 sudo[1922]: pam_unix(sudo:session): session closed for user root Apr 12 18:22:17.592000 audit[1922]: USER_END pid=1922 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.607952 kernel: audit: type=1130 audit(1712946137.588:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.608038 kernel: audit: type=1106 audit(1712946137.592:164): pid=1922 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.608081 kernel: audit: type=1104 audit(1712946137.592:165): pid=1922 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.592000 audit[1922]: CRED_DISP pid=1922 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.620553 sshd[1919]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:17.621000 audit[1919]: USER_END pid=1919 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.624713 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:22:17.625813 systemd[1]: sshd@5-172.31.28.18:22-139.178.89.65:59862.service: Deactivated successfully. Apr 12 18:22:17.629327 systemd-logind[1678]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:22:17.631395 systemd-logind[1678]: Removed session 6. Apr 12 18:22:17.621000 audit[1919]: CRED_DISP pid=1919 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.646285 kernel: audit: type=1106 audit(1712946137.621:166): pid=1919 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.646403 kernel: audit: type=1104 audit(1712946137.621:167): pid=1919 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.646453 kernel: audit: type=1131 audit(1712946137.625:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.18:22-139.178.89.65:59862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.18:22-139.178.89.65:59862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.652186 systemd[1]: Started sshd@6-172.31.28.18:22-139.178.89.65:59864.service. Apr 12 18:22:17.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.18:22-139.178.89.65:59864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.823000 audit[1949]: USER_ACCT pid=1949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.824789 sshd[1949]: Accepted publickey for core from 139.178.89.65 port 59864 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:17.825000 audit[1949]: CRED_ACQ pid=1949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.825000 audit[1949]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff457ccb0 a2=3 a3=1 items=0 ppid=1 pid=1949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:17.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:22:17.827714 sshd[1949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:17.835785 systemd-logind[1678]: New session 7 of user core. Apr 12 18:22:17.836777 systemd[1]: Started session-7.scope. Apr 12 18:22:17.844000 audit[1949]: USER_START pid=1949 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.847000 audit[1951]: CRED_ACQ pid=1951 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.942000 audit[1952]: USER_ACCT pid=1952 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.944852 sudo[1952]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:22:17.944000 audit[1952]: CRED_REFR pid=1952 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.946299 sudo[1952]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:22:17.948000 audit[1952]: USER_START pid=1952 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:18.636947 systemd[1]: Starting docker.service... Apr 12 18:22:18.716013 env[1967]: time="2024-04-12T18:22:18.715909507Z" level=info msg="Starting up" Apr 12 18:22:18.718345 env[1967]: time="2024-04-12T18:22:18.718298476Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:22:18.718517 env[1967]: time="2024-04-12T18:22:18.718487830Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:22:18.718686 env[1967]: time="2024-04-12T18:22:18.718652324Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:22:18.718794 env[1967]: time="2024-04-12T18:22:18.718766631Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:22:18.722023 env[1967]: time="2024-04-12T18:22:18.721975658Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:22:18.722199 env[1967]: time="2024-04-12T18:22:18.722171053Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:22:18.722380 env[1967]: time="2024-04-12T18:22:18.722347917Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:22:18.722565 env[1967]: time="2024-04-12T18:22:18.722538340Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:22:18.737358 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3757152870-merged.mount: Deactivated successfully. Apr 12 18:22:18.971972 env[1967]: time="2024-04-12T18:22:18.971827439Z" level=info msg="Loading containers: start." Apr 12 18:22:19.057000 audit[1998]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.057000 audit[1998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd8b40440 a2=0 a3=1 items=0 ppid=1967 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.057000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:22:19.061000 audit[2000]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.061000 audit[2000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffdd59d2d0 a2=0 a3=1 items=0 ppid=1967 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:22:19.065000 audit[2002]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2002 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.065000 audit[2002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffcc5e1f90 a2=0 a3=1 items=0 ppid=1967 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.065000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:22:19.069000 audit[2004]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.069000 audit[2004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdb36fc60 a2=0 a3=1 items=0 ppid=1967 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.069000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:22:19.074000 audit[2006]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.074000 audit[2006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdae91520 a2=0 a3=1 items=0 ppid=1967 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.074000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:22:19.101000 audit[2011]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.101000 audit[2011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcec36de0 a2=0 a3=1 items=0 ppid=1967 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:22:19.112000 audit[2013]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2013 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.112000 audit[2013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdfb48bf0 a2=0 a3=1 items=0 ppid=1967 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:22:19.116000 audit[2015]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2015 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.116000 audit[2015]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffcff1b600 a2=0 a3=1 items=0 ppid=1967 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:22:19.120000 audit[2017]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.120000 audit[2017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffeec81a70 a2=0 a3=1 items=0 ppid=1967 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:22:19.134000 audit[2021]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2021 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.134000 audit[2021]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd7a231b0 a2=0 a3=1 items=0 ppid=1967 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:22:19.136000 audit[2022]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2022 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.136000 audit[2022]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffd04a870 a2=0 a3=1 items=0 ppid=1967 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:22:19.155265 kernel: Initializing XFRM netlink socket Apr 12 18:22:19.196135 env[1967]: time="2024-04-12T18:22:19.196065553Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:22:19.199969 (udev-worker)[1978]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:22:19.228000 audit[2030]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2030 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.228000 audit[2030]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd1d18370 a2=0 a3=1 items=0 ppid=1967 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.228000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:22:19.242000 audit[2033]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2033 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.242000 audit[2033]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffddfb6aa0 a2=0 a3=1 items=0 ppid=1967 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.242000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:22:19.249000 audit[2036]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2036 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.249000 audit[2036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff14e2680 a2=0 a3=1 items=0 ppid=1967 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:22:19.253000 audit[2038]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2038 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.253000 audit[2038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffffbfbdab0 a2=0 a3=1 items=0 ppid=1967 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.253000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:22:19.257000 audit[2040]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2040 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.257000 audit[2040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd01d5e50 a2=0 a3=1 items=0 ppid=1967 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.257000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:22:19.261000 audit[2042]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2042 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.261000 audit[2042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffdfda5480 a2=0 a3=1 items=0 ppid=1967 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.261000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:22:19.265000 audit[2044]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2044 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.265000 audit[2044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe62f57a0 a2=0 a3=1 items=0 ppid=1967 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.265000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:22:19.278000 audit[2047]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2047 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.278000 audit[2047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd7ab9fc0 a2=0 a3=1 items=0 ppid=1967 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.278000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:22:19.282000 audit[2049]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2049 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.282000 audit[2049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe7b7b750 a2=0 a3=1 items=0 ppid=1967 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:22:19.287000 audit[2051]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2051 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.287000 audit[2051]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc436de80 a2=0 a3=1 items=0 ppid=1967 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.287000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:22:19.291000 audit[2053]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.291000 audit[2053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffeaa43460 a2=0 a3=1 items=0 ppid=1967 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.291000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:22:19.293594 systemd-networkd[1493]: docker0: Link UP Apr 12 18:22:19.309000 audit[2057]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.309000 audit[2057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffd2a3560 a2=0 a3=1 items=0 ppid=1967 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.309000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:22:19.312000 audit[2058]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:19.312000 audit[2058]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffea6a54b0 a2=0 a3=1 items=0 ppid=1967 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:19.312000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:22:19.314148 env[1967]: time="2024-04-12T18:22:19.314094974Z" level=info msg="Loading containers: done." Apr 12 18:22:19.334789 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3630381978-merged.mount: Deactivated successfully. Apr 12 18:22:19.358161 env[1967]: time="2024-04-12T18:22:19.358084919Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:22:19.358478 env[1967]: time="2024-04-12T18:22:19.358440575Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:22:19.358664 env[1967]: time="2024-04-12T18:22:19.358633787Z" level=info msg="Daemon has completed initialization" Apr 12 18:22:19.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:19.382453 systemd[1]: Started docker.service. Apr 12 18:22:19.392189 env[1967]: time="2024-04-12T18:22:19.392121965Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:22:19.426353 systemd[1]: Reloading. Apr 12 18:22:19.554328 /usr/lib/systemd/system-generators/torcx-generator[2107]: time="2024-04-12T18:22:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:22:19.554394 /usr/lib/systemd/system-generators/torcx-generator[2107]: time="2024-04-12T18:22:19Z" level=info msg="torcx already run" Apr 12 18:22:19.723731 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:22:19.724404 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:22:19.768527 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:22:19.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.926000 audit: BPF prog-id=34 op=LOAD Apr 12 18:22:19.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.927000 audit: BPF prog-id=35 op=LOAD Apr 12 18:22:19.927000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:22:19.927000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.930000 audit: BPF prog-id=36 op=LOAD Apr 12 18:22:19.930000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:22:19.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.932000 audit: BPF prog-id=37 op=LOAD Apr 12 18:22:19.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.933000 audit: BPF prog-id=38 op=LOAD Apr 12 18:22:19.933000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:22:19.933000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:22:19.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.937000 audit: BPF prog-id=39 op=LOAD Apr 12 18:22:19.937000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:22:19.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.938000 audit: BPF prog-id=40 op=LOAD Apr 12 18:22:19.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.939000 audit: BPF prog-id=41 op=LOAD Apr 12 18:22:19.939000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:22:19.940000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:22:19.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.944000 audit: BPF prog-id=42 op=LOAD Apr 12 18:22:19.945000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:22:19.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.947000 audit: BPF prog-id=43 op=LOAD Apr 12 18:22:19.947000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:22:19.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.950000 audit: BPF prog-id=44 op=LOAD Apr 12 18:22:19.950000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.954000 audit: BPF prog-id=45 op=LOAD Apr 12 18:22:19.955000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:22:19.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.956000 audit: BPF prog-id=46 op=LOAD Apr 12 18:22:19.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.957000 audit: BPF prog-id=47 op=LOAD Apr 12 18:22:19.957000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:22:19.957000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.961000 audit: BPF prog-id=48 op=LOAD Apr 12 18:22:19.961000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:22:19.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit: BPF prog-id=49 op=LOAD Apr 12 18:22:19.966000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit: BPF prog-id=50 op=LOAD Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:19.966000 audit: BPF prog-id=51 op=LOAD Apr 12 18:22:19.966000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:22:19.966000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:22:20.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:20.020086 systemd[1]: Started kubelet.service. Apr 12 18:22:20.147130 kubelet[2161]: E0412 18:22:20.147054 2161 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:22:20.155678 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:22:20.155990 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:22:20.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:22:20.463324 env[1686]: time="2024-04-12T18:22:20.463251156Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 18:22:21.087686 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3563701634.mount: Deactivated successfully. Apr 12 18:22:23.270678 env[1686]: time="2024-04-12T18:22:23.270590453Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:23.274049 env[1686]: time="2024-04-12T18:22:23.273979291Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2581114f5709d3459ca39f243fd21fde75f2f60d205ffdcd57b4207c33980794,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:23.280601 env[1686]: time="2024-04-12T18:22:23.277536393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:23.282358 env[1686]: time="2024-04-12T18:22:23.282304090Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:23.284169 env[1686]: time="2024-04-12T18:22:23.284111751Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:2581114f5709d3459ca39f243fd21fde75f2f60d205ffdcd57b4207c33980794\"" Apr 12 18:22:23.302654 env[1686]: time="2024-04-12T18:22:23.302601189Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 18:22:25.617370 env[1686]: time="2024-04-12T18:22:25.617290127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:25.628431 env[1686]: time="2024-04-12T18:22:25.628364203Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:121d70d9a3805f44c7c587a60d9360495cf9d95129047f4818bb7110ec1ec195,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:25.631936 env[1686]: time="2024-04-12T18:22:25.631872565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:25.634582 env[1686]: time="2024-04-12T18:22:25.634518244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:25.636148 env[1686]: time="2024-04-12T18:22:25.636082838Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:121d70d9a3805f44c7c587a60d9360495cf9d95129047f4818bb7110ec1ec195\"" Apr 12 18:22:25.654287 env[1686]: time="2024-04-12T18:22:25.654204421Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 18:22:27.145201 env[1686]: time="2024-04-12T18:22:27.145142200Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:27.147819 env[1686]: time="2024-04-12T18:22:27.147770370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b51f9f6bc9b9a68473278361df0e8985109b56c7b649532c6bffcab2a8c65fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:27.151008 env[1686]: time="2024-04-12T18:22:27.150956931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:27.155978 env[1686]: time="2024-04-12T18:22:27.155898214Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:4b51f9f6bc9b9a68473278361df0e8985109b56c7b649532c6bffcab2a8c65fb\"" Apr 12 18:22:27.156318 env[1686]: time="2024-04-12T18:22:27.156094261Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:27.174110 env[1686]: time="2024-04-12T18:22:27.174055871Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 18:22:28.551490 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2629748738.mount: Deactivated successfully. Apr 12 18:22:29.406329 env[1686]: time="2024-04-12T18:22:29.406266669Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:29.433721 env[1686]: time="2024-04-12T18:22:29.433070706Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:29.437607 env[1686]: time="2024-04-12T18:22:29.437538812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:29.452252 env[1686]: time="2024-04-12T18:22:29.452136250Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:29.452681 env[1686]: time="2024-04-12T18:22:29.452623772Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775\"" Apr 12 18:22:29.476415 env[1686]: time="2024-04-12T18:22:29.476351405Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 18:22:30.112469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount758710542.mount: Deactivated successfully. Apr 12 18:22:30.419915 kernel: kauditd_printk_skb: 292 callbacks suppressed Apr 12 18:22:30.420055 kernel: audit: type=1130 audit(1712946150.406:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:30.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:30.407350 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:22:30.407706 systemd[1]: Stopped kubelet.service. Apr 12 18:22:30.420922 systemd[1]: Started kubelet.service. Apr 12 18:22:30.433024 kernel: audit: type=1131 audit(1712946150.406:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:30.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:30.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:30.444475 kernel: audit: type=1130 audit(1712946150.419:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:30.537886 kubelet[2200]: E0412 18:22:30.537823 2200 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:22:30.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:22:30.545960 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:22:30.546303 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:22:30.555265 kernel: audit: type=1131 audit(1712946150.545:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:22:31.474858 env[1686]: time="2024-04-12T18:22:31.474789085Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:31.478000 env[1686]: time="2024-04-12T18:22:31.477936935Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:31.481434 env[1686]: time="2024-04-12T18:22:31.481375814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:31.484892 env[1686]: time="2024-04-12T18:22:31.484832554Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:31.486839 env[1686]: time="2024-04-12T18:22:31.486776356Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Apr 12 18:22:31.503852 env[1686]: time="2024-04-12T18:22:31.503789089Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:22:31.994537 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount847995042.mount: Deactivated successfully. Apr 12 18:22:32.003505 env[1686]: time="2024-04-12T18:22:32.003448832Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:32.006190 env[1686]: time="2024-04-12T18:22:32.006143001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:32.008757 env[1686]: time="2024-04-12T18:22:32.008711562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:32.011436 env[1686]: time="2024-04-12T18:22:32.011359541Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:32.012781 env[1686]: time="2024-04-12T18:22:32.012717393Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 18:22:32.030154 env[1686]: time="2024-04-12T18:22:32.030104006Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 18:22:32.547143 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3436717331.mount: Deactivated successfully. Apr 12 18:22:36.190076 env[1686]: time="2024-04-12T18:22:36.189996714Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:36.193848 env[1686]: time="2024-04-12T18:22:36.193764605Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:36.199423 env[1686]: time="2024-04-12T18:22:36.199338896Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:36.205260 env[1686]: time="2024-04-12T18:22:36.205148398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:36.208307 env[1686]: time="2024-04-12T18:22:36.207597102Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Apr 12 18:22:40.697992 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 18:22:40.698353 systemd[1]: Stopped kubelet.service. Apr 12 18:22:40.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:40.714274 systemd[1]: Started kubelet.service. Apr 12 18:22:40.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:40.724833 kernel: audit: type=1130 audit(1712946160.697:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:40.724918 kernel: audit: type=1131 audit(1712946160.697:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:40.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:40.741928 kernel: audit: type=1130 audit(1712946160.713:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:40.844100 kubelet[2274]: E0412 18:22:40.844028 2274 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:22:40.848071 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:22:40.848443 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:22:40.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:22:40.859257 kernel: audit: type=1131 audit(1712946160.847:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:22:41.777490 amazon-ssm-agent[1812]: 2024-04-12 18:22:41 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Apr 12 18:22:42.147023 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 18:22:42.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:42.157262 kernel: audit: type=1131 audit(1712946162.146:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:42.171000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:22:42.171000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:22:42.175295 kernel: audit: type=1334 audit(1712946162.171:420): prog-id=41 op=UNLOAD Apr 12 18:22:42.171000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:22:42.180624 kernel: audit: type=1334 audit(1712946162.171:421): prog-id=40 op=UNLOAD Apr 12 18:22:42.180691 kernel: audit: type=1334 audit(1712946162.171:422): prog-id=39 op=UNLOAD Apr 12 18:22:45.465051 systemd[1]: Stopped kubelet.service. Apr 12 18:22:45.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.483195 kernel: audit: type=1130 audit(1712946165.464:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.483349 kernel: audit: type=1131 audit(1712946165.464:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.503576 systemd[1]: Reloading. Apr 12 18:22:45.627476 /usr/lib/systemd/system-generators/torcx-generator[2307]: time="2024-04-12T18:22:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:22:45.627542 /usr/lib/systemd/system-generators/torcx-generator[2307]: time="2024-04-12T18:22:45Z" level=info msg="torcx already run" Apr 12 18:22:45.784357 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:22:45.784666 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:22:45.827229 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:22:45.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.995478 kernel: audit: type=1400 audit(1712946165.978:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.995587 kernel: audit: type=1400 audit(1712946165.985:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.003277 kernel: audit: type=1400 audit(1712946165.985:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.010776 kernel: audit: type=1400 audit(1712946165.985:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.010890 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.020188 kernel: audit: type=1400 audit(1712946165.985:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.020322 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.030154 kernel: audit: type=1400 audit(1712946165.985:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.030330 kernel: audit: backlog limit exceeded Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.039048 kernel: audit: type=1400 audit(1712946165.985:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit: BPF prog-id=52 op=LOAD Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.985000 audit: BPF prog-id=53 op=LOAD Apr 12 18:22:45.985000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:22:45.985000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit: BPF prog-id=54 op=LOAD Apr 12 18:22:45.994000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit: BPF prog-id=55 op=LOAD Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.994000 audit: BPF prog-id=56 op=LOAD Apr 12 18:22:45.994000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:22:45.994000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:45.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.002000 audit: BPF prog-id=57 op=LOAD Apr 12 18:22:46.002000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:22:46.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.040000 audit: BPF prog-id=59 op=LOAD Apr 12 18:22:46.040000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit: BPF prog-id=60 op=LOAD Apr 12 18:22:46.043000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit: BPF prog-id=61 op=LOAD Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.043000 audit: BPF prog-id=62 op=LOAD Apr 12 18:22:46.043000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:22:46.043000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.046000 audit: BPF prog-id=63 op=LOAD Apr 12 18:22:46.046000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit: BPF prog-id=64 op=LOAD Apr 12 18:22:46.052000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit: BPF prog-id=65 op=LOAD Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:46.052000 audit: BPF prog-id=66 op=LOAD Apr 12 18:22:46.052000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:22:46.052000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:22:46.093998 systemd[1]: Started kubelet.service. Apr 12 18:22:46.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:46.170097 kubelet[2362]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:22:46.170662 kubelet[2362]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:22:46.170767 kubelet[2362]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:22:46.171026 kubelet[2362]: I0412 18:22:46.170974 2362 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:22:47.369066 kubelet[2362]: I0412 18:22:47.369024 2362 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:22:47.369731 kubelet[2362]: I0412 18:22:47.369706 2362 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:22:47.370164 kubelet[2362]: I0412 18:22:47.370139 2362 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:22:47.378755 kubelet[2362]: E0412 18:22:47.378691 2362 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.28.18:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.381775 kubelet[2362]: I0412 18:22:47.381701 2362 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:22:47.392926 kubelet[2362]: I0412 18:22:47.392872 2362 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:22:47.393399 kubelet[2362]: I0412 18:22:47.393368 2362 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:22:47.393691 kubelet[2362]: I0412 18:22:47.393658 2362 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:22:47.393877 kubelet[2362]: I0412 18:22:47.393704 2362 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:22:47.393877 kubelet[2362]: I0412 18:22:47.393726 2362 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:22:47.394002 kubelet[2362]: I0412 18:22:47.393892 2362 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:22:47.394268 kubelet[2362]: I0412 18:22:47.394203 2362 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:22:47.394340 kubelet[2362]: I0412 18:22:47.394276 2362 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:22:47.394340 kubelet[2362]: I0412 18:22:47.394321 2362 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:22:47.394489 kubelet[2362]: I0412 18:22:47.394348 2362 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:22:47.395805 kubelet[2362]: W0412 18:22:47.395737 2362 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.28.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.396015 kubelet[2362]: E0412 18:22:47.395989 2362 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.28.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.396269 kubelet[2362]: I0412 18:22:47.396243 2362 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:22:47.396872 kubelet[2362]: I0412 18:22:47.396841 2362 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:22:47.397113 kubelet[2362]: W0412 18:22:47.397092 2362 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:22:47.398352 kubelet[2362]: I0412 18:22:47.398317 2362 server.go:1256] "Started kubelet" Apr 12 18:22:47.398697 kubelet[2362]: W0412 18:22:47.398640 2362 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.28.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-18&limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.398834 kubelet[2362]: E0412 18:22:47.398812 2362 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.28.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-18&limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.400000 audit[2362]: AVC avc: denied { mac_admin } for pid=2362 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:47.400000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:47.400000 audit[2362]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b5d800 a1=4000a1c468 a2=4000b5d7d0 a3=25 items=0 ppid=1 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.400000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:47.402935 kubelet[2362]: I0412 18:22:47.402900 2362 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:22:47.401000 audit[2362]: AVC avc: denied { mac_admin } for pid=2362 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:47.401000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:47.401000 audit[2362]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c30f00 a1=4000a1c480 a2=4000b5d890 a3=25 items=0 ppid=1 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.401000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:47.403607 kubelet[2362]: I0412 18:22:47.403574 2362 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:22:47.403949 kubelet[2362]: I0412 18:22:47.403919 2362 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:22:47.406307 kubelet[2362]: E0412 18:22:47.406203 2362 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.28.18:6443/api/v1/namespaces/default/events\": dial tcp 172.31.28.18:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-28-18.17c59b76b3241119 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-28-18,UID:ip-172-31-28-18,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-28-18,},FirstTimestamp:2024-04-12 18:22:47.398273305 +0000 UTC m=+1.297831497,LastTimestamp:2024-04-12 18:22:47.398273305 +0000 UTC m=+1.297831497,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-28-18,}" Apr 12 18:22:47.408000 audit[2373]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:47.408000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffca3505b0 a2=0 a3=1 items=0 ppid=2362 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:22:47.410112 kubelet[2362]: E0412 18:22:47.410064 2362 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:22:47.410000 audit[2374]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:47.410000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0209070 a2=0 a3=1 items=0 ppid=2362 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:22:47.413511 kubelet[2362]: I0412 18:22:47.413451 2362 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:22:47.414916 kubelet[2362]: I0412 18:22:47.414858 2362 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:22:47.415085 kubelet[2362]: I0412 18:22:47.415060 2362 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:22:47.416796 kubelet[2362]: I0412 18:22:47.416737 2362 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:22:47.417109 kubelet[2362]: I0412 18:22:47.417071 2362 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:22:47.416000 audit[2376]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:47.416000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffa275f00 a2=0 a3=1 items=0 ppid=2362 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:22:47.419471 kubelet[2362]: I0412 18:22:47.419423 2362 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:22:47.419640 kubelet[2362]: I0412 18:22:47.419600 2362 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:22:47.420486 kubelet[2362]: E0412 18:22:47.420429 2362 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-18?timeout=10s\": dial tcp 172.31.28.18:6443: connect: connection refused" interval="200ms" Apr 12 18:22:47.421420 kubelet[2362]: I0412 18:22:47.421368 2362 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:22:47.421679 kubelet[2362]: I0412 18:22:47.421657 2362 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:22:47.423069 kubelet[2362]: I0412 18:22:47.423015 2362 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:22:47.422000 audit[2378]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:47.422000 audit[2378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc3af1120 a2=0 a3=1 items=0 ppid=2362 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:22:47.439092 kubelet[2362]: W0412 18:22:47.439021 2362 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.28.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.439497 kubelet[2362]: E0412 18:22:47.439470 2362 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.28.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.452431 kubelet[2362]: I0412 18:22:47.452391 2362 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:22:47.452655 kubelet[2362]: I0412 18:22:47.452633 2362 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:22:47.452785 kubelet[2362]: I0412 18:22:47.452765 2362 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:22:47.452000 audit[2384]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:47.452000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff7d4f6c0 a2=0 a3=1 items=0 ppid=2362 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:22:47.455141 kubelet[2362]: I0412 18:22:47.455112 2362 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:22:47.455438 kubelet[2362]: I0412 18:22:47.455414 2362 policy_none.go:49] "None policy: Start" Apr 12 18:22:47.456000 audit[2385]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:47.456000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffde3de1b0 a2=0 a3=1 items=0 ppid=2362 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:22:47.456000 audit[2386]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:47.456000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea3478b0 a2=0 a3=1 items=0 ppid=2362 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:22:47.458930 kubelet[2362]: I0412 18:22:47.458893 2362 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:22:47.459136 kubelet[2362]: I0412 18:22:47.459113 2362 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:22:47.459343 kubelet[2362]: I0412 18:22:47.459319 2362 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:22:47.459838 kubelet[2362]: E0412 18:22:47.459809 2362 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:22:47.458000 audit[2387]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:47.458000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff985e760 a2=0 a3=1 items=0 ppid=2362 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:22:47.461000 audit[2388]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:47.461000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf25bc20 a2=0 a3=1 items=0 ppid=2362 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:22:47.464000 audit[2389]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:47.464000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff07f5010 a2=0 a3=1 items=0 ppid=2362 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:22:47.464000 audit[2390]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:47.464000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc04c7c0 a2=0 a3=1 items=0 ppid=2362 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:22:47.465000 audit[2391]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:47.465000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce2e2280 a2=0 a3=1 items=0 ppid=2362 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:22:47.467976 kubelet[2362]: W0412 18:22:47.467896 2362 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.28.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.468189 kubelet[2362]: E0412 18:22:47.468164 2362 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.28.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:47.469992 kubelet[2362]: I0412 18:22:47.469935 2362 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:22:47.470175 kubelet[2362]: I0412 18:22:47.470004 2362 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:22:47.482949 systemd[1]: Created slice kubepods.slice. Apr 12 18:22:47.493632 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:22:47.501251 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:22:47.513616 kubelet[2362]: I0412 18:22:47.513571 2362 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:22:47.512000 audit[2362]: AVC avc: denied { mac_admin } for pid=2362 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:47.512000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:47.512000 audit[2362]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dd26c0 a1=40009a8540 a2=4000dd2690 a3=25 items=0 ppid=1 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:47.512000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:47.514860 kubelet[2362]: I0412 18:22:47.514822 2362 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:22:47.516181 kubelet[2362]: I0412 18:22:47.516143 2362 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:22:47.519638 kubelet[2362]: E0412 18:22:47.519599 2362 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-28-18\" not found" Apr 12 18:22:47.520105 kubelet[2362]: I0412 18:22:47.520069 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-18" Apr 12 18:22:47.522157 kubelet[2362]: E0412 18:22:47.522029 2362 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.18:6443/api/v1/nodes\": dial tcp 172.31.28.18:6443: connect: connection refused" node="ip-172-31-28-18" Apr 12 18:22:47.562780 kubelet[2362]: I0412 18:22:47.562716 2362 topology_manager.go:215] "Topology Admit Handler" podUID="a949e4ca7f9de0090cc90aae3d3da05d" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-28-18" Apr 12 18:22:47.565125 kubelet[2362]: I0412 18:22:47.565073 2362 topology_manager.go:215] "Topology Admit Handler" podUID="3678970afa7197328e5e547307831875" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:47.567517 kubelet[2362]: I0412 18:22:47.567364 2362 topology_manager.go:215] "Topology Admit Handler" podUID="082f829d4b804c58cf5d03d1d32f2e56" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-28-18" Apr 12 18:22:47.579333 systemd[1]: Created slice kubepods-burstable-poda949e4ca7f9de0090cc90aae3d3da05d.slice. Apr 12 18:22:47.591722 systemd[1]: Created slice kubepods-burstable-pod082f829d4b804c58cf5d03d1d32f2e56.slice. Apr 12 18:22:47.607914 systemd[1]: Created slice kubepods-burstable-pod3678970afa7197328e5e547307831875.slice. Apr 12 18:22:47.625268 kubelet[2362]: E0412 18:22:47.620878 2362 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-18?timeout=10s\": dial tcp 172.31.28.18:6443: connect: connection refused" interval="400ms" Apr 12 18:22:47.723535 kubelet[2362]: I0412 18:22:47.723435 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-k8s-certs\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:47.723535 kubelet[2362]: I0412 18:22:47.723516 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a949e4ca7f9de0090cc90aae3d3da05d-ca-certs\") pod \"kube-apiserver-ip-172-31-28-18\" (UID: \"a949e4ca7f9de0090cc90aae3d3da05d\") " pod="kube-system/kube-apiserver-ip-172-31-28-18" Apr 12 18:22:47.723717 kubelet[2362]: I0412 18:22:47.723563 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a949e4ca7f9de0090cc90aae3d3da05d-k8s-certs\") pod \"kube-apiserver-ip-172-31-28-18\" (UID: \"a949e4ca7f9de0090cc90aae3d3da05d\") " pod="kube-system/kube-apiserver-ip-172-31-28-18" Apr 12 18:22:47.723717 kubelet[2362]: I0412 18:22:47.723612 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a949e4ca7f9de0090cc90aae3d3da05d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-28-18\" (UID: \"a949e4ca7f9de0090cc90aae3d3da05d\") " pod="kube-system/kube-apiserver-ip-172-31-28-18" Apr 12 18:22:47.723717 kubelet[2362]: I0412 18:22:47.723660 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-ca-certs\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:47.723717 kubelet[2362]: I0412 18:22:47.723707 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:47.723961 kubelet[2362]: I0412 18:22:47.723752 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-kubeconfig\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:47.723961 kubelet[2362]: I0412 18:22:47.723807 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:47.723961 kubelet[2362]: I0412 18:22:47.723852 2362 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/082f829d4b804c58cf5d03d1d32f2e56-kubeconfig\") pod \"kube-scheduler-ip-172-31-28-18\" (UID: \"082f829d4b804c58cf5d03d1d32f2e56\") " pod="kube-system/kube-scheduler-ip-172-31-28-18" Apr 12 18:22:47.725457 kubelet[2362]: I0412 18:22:47.725417 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-18" Apr 12 18:22:47.725956 kubelet[2362]: E0412 18:22:47.725898 2362 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.18:6443/api/v1/nodes\": dial tcp 172.31.28.18:6443: connect: connection refused" node="ip-172-31-28-18" Apr 12 18:22:47.896279 env[1686]: time="2024-04-12T18:22:47.894833973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-28-18,Uid:a949e4ca7f9de0090cc90aae3d3da05d,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:47.904609 env[1686]: time="2024-04-12T18:22:47.904537230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-28-18,Uid:082f829d4b804c58cf5d03d1d32f2e56,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:47.913226 env[1686]: time="2024-04-12T18:22:47.913117569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-28-18,Uid:3678970afa7197328e5e547307831875,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:48.023939 kubelet[2362]: E0412 18:22:48.023876 2362 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-18?timeout=10s\": dial tcp 172.31.28.18:6443: connect: connection refused" interval="800ms" Apr 12 18:22:48.128975 kubelet[2362]: I0412 18:22:48.128917 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-18" Apr 12 18:22:48.129597 kubelet[2362]: E0412 18:22:48.129557 2362 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.18:6443/api/v1/nodes\": dial tcp 172.31.28.18:6443: connect: connection refused" node="ip-172-31-28-18" Apr 12 18:22:48.286782 kubelet[2362]: W0412 18:22:48.286631 2362 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.28.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-18&limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:48.286782 kubelet[2362]: E0412 18:22:48.286728 2362 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.28.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-18&limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:48.288480 kubelet[2362]: W0412 18:22:48.288355 2362 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.28.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:48.288480 kubelet[2362]: E0412 18:22:48.288446 2362 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.28.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:48.372084 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1711561426.mount: Deactivated successfully. Apr 12 18:22:48.384581 env[1686]: time="2024-04-12T18:22:48.384518924Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.386777 env[1686]: time="2024-04-12T18:22:48.386724632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.389610 env[1686]: time="2024-04-12T18:22:48.389520304Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.394474 env[1686]: time="2024-04-12T18:22:48.394390773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.396804 env[1686]: time="2024-04-12T18:22:48.396750627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.402347 env[1686]: time="2024-04-12T18:22:48.402288421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.410019 env[1686]: time="2024-04-12T18:22:48.409957874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.416098 env[1686]: time="2024-04-12T18:22:48.416000026Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.419401 env[1686]: time="2024-04-12T18:22:48.419346500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.421108 env[1686]: time="2024-04-12T18:22:48.421007394Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.423310 env[1686]: time="2024-04-12T18:22:48.423259812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.425503 env[1686]: time="2024-04-12T18:22:48.425407782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:48.477957 env[1686]: time="2024-04-12T18:22:48.477835684Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:48.478207 env[1686]: time="2024-04-12T18:22:48.478157741Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:48.478400 env[1686]: time="2024-04-12T18:22:48.478351551Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:48.479368 env[1686]: time="2024-04-12T18:22:48.479195019Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91232c08f4a7e293385749fb4e4913599a8e44f4a83929699edd59354abc93d8 pid=2399 runtime=io.containerd.runc.v2 Apr 12 18:22:48.485943 env[1686]: time="2024-04-12T18:22:48.485821110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:48.486114 env[1686]: time="2024-04-12T18:22:48.485969218Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:48.486114 env[1686]: time="2024-04-12T18:22:48.486033918Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:48.488519 env[1686]: time="2024-04-12T18:22:48.487800712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33fe46931a740ca1098763a2877465c1ba5ff0f507175145682c3f8626cd3d04 pid=2412 runtime=io.containerd.runc.v2 Apr 12 18:22:48.499777 env[1686]: time="2024-04-12T18:22:48.499656052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:48.499939 env[1686]: time="2024-04-12T18:22:48.499821191Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:48.500048 env[1686]: time="2024-04-12T18:22:48.499916758Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:48.500374 env[1686]: time="2024-04-12T18:22:48.500290949Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0de67dd958339f5fe0ba11fceecefe514163eb5c801474add465082794a11f3f pid=2437 runtime=io.containerd.runc.v2 Apr 12 18:22:48.538322 systemd[1]: Started cri-containerd-91232c08f4a7e293385749fb4e4913599a8e44f4a83929699edd59354abc93d8.scope. Apr 12 18:22:48.559870 systemd[1]: Started cri-containerd-33fe46931a740ca1098763a2877465c1ba5ff0f507175145682c3f8626cd3d04.scope. Apr 12 18:22:48.574951 systemd[1]: Started cri-containerd-0de67dd958339f5fe0ba11fceecefe514163eb5c801474add465082794a11f3f.scope. Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.600000 audit: BPF prog-id=67 op=LOAD Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2399 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323332633038663461376532393333383537343966623465343931 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2399 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323332633038663461376532393333383537343966623465343931 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.601000 audit: BPF prog-id=68 op=LOAD Apr 12 18:22:48.601000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2399 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323332633038663461376532393333383537343966623465343931 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit: BPF prog-id=69 op=LOAD Apr 12 18:22:48.602000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2399 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323332633038663461376532393333383537343966623465343931 Apr 12 18:22:48.602000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:22:48.602000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.602000 audit: BPF prog-id=70 op=LOAD Apr 12 18:22:48.602000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2399 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323332633038663461376532393333383537343966623465343931 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.616000 audit: BPF prog-id=71 op=LOAD Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653637646439353833333966356665306261313166636565636566 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653637646439353833333966356665306261313166636565636566 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.617000 audit: BPF prog-id=72 op=LOAD Apr 12 18:22:48.617000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653637646439353833333966356665306261313166636565636566 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit: BPF prog-id=73 op=LOAD Apr 12 18:22:48.618000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653637646439353833333966356665306261313166636565636566 Apr 12 18:22:48.618000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:22:48.618000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.618000 audit: BPF prog-id=74 op=LOAD Apr 12 18:22:48.618000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653637646439353833333966356665306261313166636565636566 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.659000 audit: BPF prog-id=75 op=LOAD Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=2412 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333666534363933316137343063613130393837363361323837373436 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2412 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333666534363933316137343063613130393837363361323837373436 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.661000 audit: BPF prog-id=76 op=LOAD Apr 12 18:22:48.661000 audit[2438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2412 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333666534363933316137343063613130393837363361323837373436 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.663000 audit: BPF prog-id=77 op=LOAD Apr 12 18:22:48.663000 audit[2438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2412 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333666534363933316137343063613130393837363361323837373436 Apr 12 18:22:48.664000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:22:48.664000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.664000 audit: BPF prog-id=78 op=LOAD Apr 12 18:22:48.664000 audit[2438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2412 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333666534363933316137343063613130393837363361323837373436 Apr 12 18:22:48.678526 env[1686]: time="2024-04-12T18:22:48.678456516Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-28-18,Uid:3678970afa7197328e5e547307831875,Namespace:kube-system,Attempt:0,} returns sandbox id \"0de67dd958339f5fe0ba11fceecefe514163eb5c801474add465082794a11f3f\"" Apr 12 18:22:48.695564 env[1686]: time="2024-04-12T18:22:48.695508655Z" level=info msg="CreateContainer within sandbox \"0de67dd958339f5fe0ba11fceecefe514163eb5c801474add465082794a11f3f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:22:48.705653 env[1686]: time="2024-04-12T18:22:48.705570234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-28-18,Uid:a949e4ca7f9de0090cc90aae3d3da05d,Namespace:kube-system,Attempt:0,} returns sandbox id \"91232c08f4a7e293385749fb4e4913599a8e44f4a83929699edd59354abc93d8\"" Apr 12 18:22:48.715133 env[1686]: time="2024-04-12T18:22:48.715076774Z" level=info msg="CreateContainer within sandbox \"91232c08f4a7e293385749fb4e4913599a8e44f4a83929699edd59354abc93d8\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:22:48.731715 env[1686]: time="2024-04-12T18:22:48.731627675Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-28-18,Uid:082f829d4b804c58cf5d03d1d32f2e56,Namespace:kube-system,Attempt:0,} returns sandbox id \"33fe46931a740ca1098763a2877465c1ba5ff0f507175145682c3f8626cd3d04\"" Apr 12 18:22:48.739422 env[1686]: time="2024-04-12T18:22:48.739358264Z" level=info msg="CreateContainer within sandbox \"33fe46931a740ca1098763a2877465c1ba5ff0f507175145682c3f8626cd3d04\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:22:48.746085 env[1686]: time="2024-04-12T18:22:48.746011609Z" level=info msg="CreateContainer within sandbox \"0de67dd958339f5fe0ba11fceecefe514163eb5c801474add465082794a11f3f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114\"" Apr 12 18:22:48.747524 env[1686]: time="2024-04-12T18:22:48.747459419Z" level=info msg="StartContainer for \"3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114\"" Apr 12 18:22:48.766094 env[1686]: time="2024-04-12T18:22:48.766004228Z" level=info msg="CreateContainer within sandbox \"33fe46931a740ca1098763a2877465c1ba5ff0f507175145682c3f8626cd3d04\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d\"" Apr 12 18:22:48.766976 env[1686]: time="2024-04-12T18:22:48.766927038Z" level=info msg="StartContainer for \"fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d\"" Apr 12 18:22:48.792010 kubelet[2362]: W0412 18:22:48.791850 2362 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.28.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:48.792010 kubelet[2362]: E0412 18:22:48.791944 2362 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.28.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:48.810517 systemd[1]: Started cri-containerd-3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114.scope. Apr 12 18:22:48.822376 env[1686]: time="2024-04-12T18:22:48.818647579Z" level=info msg="CreateContainer within sandbox \"91232c08f4a7e293385749fb4e4913599a8e44f4a83929699edd59354abc93d8\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"095c1db9a544182735576de7e2fe47b9b41eed8fb8f237b3f1c6b65ef36f8124\"" Apr 12 18:22:48.822376 env[1686]: time="2024-04-12T18:22:48.819689166Z" level=info msg="StartContainer for \"095c1db9a544182735576de7e2fe47b9b41eed8fb8f237b3f1c6b65ef36f8124\"" Apr 12 18:22:48.825994 kubelet[2362]: E0412 18:22:48.825517 2362 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-18?timeout=10s\": dial tcp 172.31.28.18:6443: connect: connection refused" interval="1.6s" Apr 12 18:22:48.836530 systemd[1]: Started cri-containerd-fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d.scope. Apr 12 18:22:48.880365 systemd[1]: Started cri-containerd-095c1db9a544182735576de7e2fe47b9b41eed8fb8f237b3f1c6b65ef36f8124.scope. Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.890000 audit: BPF prog-id=79 op=LOAD Apr 12 18:22:48.892000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.892000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2437 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363461356366353737633530393061383931356238373363613736 Apr 12 18:22:48.892000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.892000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2437 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363461356366353737633530393061383931356238373363613736 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.893000 audit: BPF prog-id=80 op=LOAD Apr 12 18:22:48.893000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2437 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363461356366353737633530393061383931356238373363613736 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit: BPF prog-id=81 op=LOAD Apr 12 18:22:48.895000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2437 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363461356366353737633530393061383931356238373363613736 Apr 12 18:22:48.895000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:22:48.895000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.895000 audit: BPF prog-id=82 op=LOAD Apr 12 18:22:48.895000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2437 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363461356366353737633530393061383931356238373363613736 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.905000 audit: BPF prog-id=83 op=LOAD Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2412 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323761383137623036303663343634643538303031333064353061 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2412 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323761383137623036303663343634643538303031333064353061 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.910000 audit: BPF prog-id=84 op=LOAD Apr 12 18:22:48.910000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2412 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323761383137623036303663343634643538303031333064353061 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit: BPF prog-id=85 op=LOAD Apr 12 18:22:48.911000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2412 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323761383137623036303663343634643538303031333064353061 Apr 12 18:22:48.911000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:22:48.911000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.911000 audit: BPF prog-id=86 op=LOAD Apr 12 18:22:48.911000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2412 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323761383137623036303663343634643538303031333064353061 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.929000 audit: BPF prog-id=87 op=LOAD Apr 12 18:22:48.933490 kubelet[2362]: I0412 18:22:48.933444 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-18" Apr 12 18:22:48.934025 kubelet[2362]: E0412 18:22:48.933958 2362 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.18:6443/api/v1/nodes\": dial tcp 172.31.28.18:6443: connect: connection refused" node="ip-172-31-28-18" Apr 12 18:22:48.932000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.932000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2399 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039356331646239613534343138323733353537366465376532666534 Apr 12 18:22:48.932000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.932000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2399 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039356331646239613534343138323733353537366465376532666534 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.933000 audit: BPF prog-id=88 op=LOAD Apr 12 18:22:48.933000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2399 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039356331646239613534343138323733353537366465376532666534 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.934000 audit: BPF prog-id=89 op=LOAD Apr 12 18:22:48.934000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2399 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039356331646239613534343138323733353537366465376532666534 Apr 12 18:22:48.934000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:22:48.934000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:48.939000 audit: BPF prog-id=90 op=LOAD Apr 12 18:22:48.939000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2399 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:48.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039356331646239613534343138323733353537366465376532666534 Apr 12 18:22:48.987824 env[1686]: time="2024-04-12T18:22:48.987766271Z" level=info msg="StartContainer for \"3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114\" returns successfully" Apr 12 18:22:49.017112 env[1686]: time="2024-04-12T18:22:49.017044696Z" level=info msg="StartContainer for \"fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d\" returns successfully" Apr 12 18:22:49.025871 env[1686]: time="2024-04-12T18:22:49.025776808Z" level=info msg="StartContainer for \"095c1db9a544182735576de7e2fe47b9b41eed8fb8f237b3f1c6b65ef36f8124\" returns successfully" Apr 12 18:22:49.036830 kubelet[2362]: W0412 18:22:49.036689 2362 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.28.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:49.036830 kubelet[2362]: E0412 18:22:49.036787 2362 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.28.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.18:6443: connect: connection refused Apr 12 18:22:50.536790 kubelet[2362]: I0412 18:22:50.536753 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-18" Apr 12 18:22:53.213000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.215891 kernel: kauditd_printk_skb: 569 callbacks suppressed Apr 12 18:22:53.215959 kernel: audit: type=1400 audit(1712946173.213:713): avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.213000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003d95cb0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.241112 kernel: audit: type=1300 audit(1712946173.213:713): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003d95cb0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.256396 kernel: audit: type=1327 audit(1712946173.213:713): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.225000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.269638 kernel: audit: type=1400 audit(1712946173.225:714): avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.225000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40066f7880 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.284536 kernel: audit: type=1300 audit(1712946173.225:714): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40066f7880 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.298367 kernel: audit: type=1327 audit(1712946173.225:714): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.226000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.310567 kernel: audit: type=1400 audit(1712946173.226:715): avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.226000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4003d95dd0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.324165 kernel: audit: type=1300 audit(1712946173.226:715): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4003d95dd0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.336403 kernel: audit: type=1327 audit(1712946173.226:715): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.319000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521032 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.347922 kernel: audit: type=1400 audit(1712946173.319:716): avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521032 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.319000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=400321b2f0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.324000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.324000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=40028ac0a0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.324000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.324000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:53.324000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=400321b8c0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:22:53.324000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:53.787960 kubelet[2362]: E0412 18:22:53.787915 2362 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-28-18\" not found" node="ip-172-31-28-18" Apr 12 18:22:53.813508 kubelet[2362]: I0412 18:22:53.813466 2362 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-28-18" Apr 12 18:22:53.936329 kubelet[2362]: E0412 18:22:53.936279 2362 event.go:346] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ip-172-31-28-18.17c59b76b3241119 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-28-18,UID:ip-172-31-28-18,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-28-18,},FirstTimestamp:2024-04-12 18:22:47.398273305 +0000 UTC m=+1.297831497,LastTimestamp:2024-04-12 18:22:47.398273305 +0000 UTC m=+1.297831497,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-28-18,}" Apr 12 18:22:54.402546 kubelet[2362]: I0412 18:22:54.402470 2362 apiserver.go:52] "Watching apiserver" Apr 12 18:22:54.422693 kubelet[2362]: I0412 18:22:54.422649 2362 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:22:55.056000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:55.056000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40006cb5c0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:22:55.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:55.057000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:55.057000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000457e60 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:22:55.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:56.158000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521058 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:22:56.158000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000837fc0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:22:56.158000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:56.233000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:56.233000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000b59a80 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:22:56.233000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:56.236000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:56.236000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bbd240 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:22:56.236000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:56.238000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:56.238000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c764e0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:22:56.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:56.238000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:56.238000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c76500 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:22:56.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:56.473850 update_engine[1679]: I0412 18:22:56.473323 1679 update_attempter.cc:509] Updating boot flags... Apr 12 18:22:56.853314 systemd[1]: Reloading. Apr 12 18:22:56.979842 /usr/lib/systemd/system-generators/torcx-generator[2782]: time="2024-04-12T18:22:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:22:56.979909 /usr/lib/systemd/system-generators/torcx-generator[2782]: time="2024-04-12T18:22:56Z" level=info msg="torcx already run" Apr 12 18:22:57.298401 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:22:57.298647 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:22:57.345753 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.556000 audit: BPF prog-id=91 op=LOAD Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.557000 audit: BPF prog-id=92 op=LOAD Apr 12 18:22:57.557000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:22:57.557000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit: BPF prog-id=93 op=LOAD Apr 12 18:22:57.559000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit: BPF prog-id=94 op=LOAD Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.559000 audit: BPF prog-id=95 op=LOAD Apr 12 18:22:57.559000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:22:57.559000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.569000 audit: BPF prog-id=96 op=LOAD Apr 12 18:22:57.569000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.572000 audit: BPF prog-id=97 op=LOAD Apr 12 18:22:57.572000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.573000 audit: BPF prog-id=98 op=LOAD Apr 12 18:22:57.573000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.576000 audit: BPF prog-id=99 op=LOAD Apr 12 18:22:57.576000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.577000 audit: BPF prog-id=100 op=LOAD Apr 12 18:22:57.577000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.579000 audit: BPF prog-id=101 op=LOAD Apr 12 18:22:57.579000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit: BPF prog-id=102 op=LOAD Apr 12 18:22:57.582000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit: BPF prog-id=103 op=LOAD Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit: BPF prog-id=104 op=LOAD Apr 12 18:22:57.582000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:22:57.582000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit: BPF prog-id=105 op=LOAD Apr 12 18:22:57.585000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.588000 audit: BPF prog-id=106 op=LOAD Apr 12 18:22:57.588000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit: BPF prog-id=107 op=LOAD Apr 12 18:22:57.590000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit: BPF prog-id=108 op=LOAD Apr 12 18:22:57.593000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit: BPF prog-id=109 op=LOAD Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.593000 audit: BPF prog-id=110 op=LOAD Apr 12 18:22:57.593000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:22:57.593000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.594000 audit: BPF prog-id=111 op=LOAD Apr 12 18:22:57.594000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:22:57.673286 kubelet[2362]: I0412 18:22:57.673141 2362 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:22:57.673661 systemd[1]: Stopping kubelet.service... Apr 12 18:22:57.694888 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:22:57.695306 systemd[1]: Stopped kubelet.service. Apr 12 18:22:57.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.695406 systemd[1]: kubelet.service: Consumed 1.876s CPU time. Apr 12 18:22:57.700265 systemd[1]: Started kubelet.service. Apr 12 18:22:57.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.850281 kubelet[2894]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:22:57.850860 kubelet[2894]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:22:57.850964 kubelet[2894]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:22:57.851229 kubelet[2894]: I0412 18:22:57.851154 2894 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:22:57.865100 kubelet[2894]: I0412 18:22:57.865057 2894 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:22:57.865375 kubelet[2894]: I0412 18:22:57.865352 2894 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:22:57.867409 kubelet[2894]: I0412 18:22:57.867360 2894 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:22:57.874737 kubelet[2894]: I0412 18:22:57.874638 2894 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:22:57.880660 kubelet[2894]: I0412 18:22:57.880617 2894 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:22:57.898915 kubelet[2894]: I0412 18:22:57.898873 2894 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:22:57.900062 kubelet[2894]: I0412 18:22:57.899935 2894 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:22:57.901037 kubelet[2894]: I0412 18:22:57.900993 2894 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:22:57.901344 kubelet[2894]: I0412 18:22:57.901316 2894 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:22:57.901513 kubelet[2894]: I0412 18:22:57.901490 2894 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:22:57.901663 kubelet[2894]: I0412 18:22:57.901642 2894 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:22:57.901978 kubelet[2894]: I0412 18:22:57.901953 2894 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:22:57.902135 kubelet[2894]: I0412 18:22:57.902113 2894 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:22:57.902397 kubelet[2894]: I0412 18:22:57.902374 2894 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:22:57.902538 kubelet[2894]: I0412 18:22:57.902516 2894 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:22:57.903688 kubelet[2894]: I0412 18:22:57.903638 2894 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:22:57.904021 kubelet[2894]: I0412 18:22:57.903981 2894 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:22:57.910997 kubelet[2894]: I0412 18:22:57.910812 2894 server.go:1256] "Started kubelet" Apr 12 18:22:57.915433 kubelet[2894]: I0412 18:22:57.915396 2894 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:22:57.916931 kubelet[2894]: I0412 18:22:57.916901 2894 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:22:57.919000 audit[2894]: AVC avc: denied { mac_admin } for pid=2894 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.919000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:57.919000 audit[2894]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cde9c0 a1=4000c40c18 a2=4000cde990 a3=25 items=0 ppid=1 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.919000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:57.923070 kubelet[2894]: I0412 18:22:57.922996 2894 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:22:57.923249 kubelet[2894]: I0412 18:22:57.923198 2894 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:22:57.922000 audit[2894]: AVC avc: denied { mac_admin } for pid=2894 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.923485 kubelet[2894]: I0412 18:22:57.923362 2894 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:22:57.922000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:57.922000 audit[2894]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c31c00 a1=4000c40c30 a2=4000cdea50 a3=25 items=0 ppid=1 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.922000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:57.925452 kubelet[2894]: I0412 18:22:57.925420 2894 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:22:57.925607 kubelet[2894]: I0412 18:22:57.925586 2894 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:22:57.941189 kubelet[2894]: I0412 18:22:57.941140 2894 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:22:57.942296 kubelet[2894]: I0412 18:22:57.942257 2894 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:22:57.942723 kubelet[2894]: I0412 18:22:57.942700 2894 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:22:57.996753 kubelet[2894]: I0412 18:22:57.996701 2894 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:22:57.997189 kubelet[2894]: I0412 18:22:57.997142 2894 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:22:58.021490 kubelet[2894]: I0412 18:22:58.021449 2894 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:22:58.024271 kubelet[2894]: I0412 18:22:58.023561 2894 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:22:58.024512 kubelet[2894]: I0412 18:22:58.024482 2894 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:22:58.024693 kubelet[2894]: I0412 18:22:58.024669 2894 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:22:58.024941 kubelet[2894]: E0412 18:22:58.024919 2894 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:22:58.053388 kubelet[2894]: E0412 18:22:58.051202 2894 container_manager_linux.go:881] "Unable to get rootfs data from cAdvisor interface" err="unable to find data in memory cache" Apr 12 18:22:58.059988 kubelet[2894]: I0412 18:22:58.059953 2894 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-18" Apr 12 18:22:58.078411 kubelet[2894]: E0412 18:22:58.078363 2894 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:22:58.081556 kubelet[2894]: I0412 18:22:58.081515 2894 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:22:58.127287 kubelet[2894]: I0412 18:22:58.125163 2894 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-28-18" Apr 12 18:22:58.130419 kubelet[2894]: I0412 18:22:58.130359 2894 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-28-18" Apr 12 18:22:58.134304 kubelet[2894]: E0412 18:22:58.127683 2894 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:22:58.240291 kubelet[2894]: I0412 18:22:58.240256 2894 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:22:58.240524 kubelet[2894]: I0412 18:22:58.240502 2894 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:22:58.240666 kubelet[2894]: I0412 18:22:58.240628 2894 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:22:58.241014 kubelet[2894]: I0412 18:22:58.240989 2894 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:22:58.241164 kubelet[2894]: I0412 18:22:58.241143 2894 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:22:58.241308 kubelet[2894]: I0412 18:22:58.241287 2894 policy_none.go:49] "None policy: Start" Apr 12 18:22:58.244034 kubelet[2894]: I0412 18:22:58.243993 2894 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:22:58.244034 kubelet[2894]: I0412 18:22:58.244049 2894 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:22:58.244378 kubelet[2894]: I0412 18:22:58.244349 2894 state_mem.go:75] "Updated machine memory state" Apr 12 18:22:58.253182 kubelet[2894]: I0412 18:22:58.253148 2894 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:22:58.252000 audit[2894]: AVC avc: denied { mac_admin } for pid=2894 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.253596 kubelet[2894]: I0412 18:22:58.253570 2894 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:22:58.255595 kernel: kauditd_printk_skb: 283 callbacks suppressed Apr 12 18:22:58.255720 kernel: audit: type=1400 audit(1712946178.252:974): avc: denied { mac_admin } for pid=2894 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.258099 kubelet[2894]: I0412 18:22:58.258066 2894 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:22:58.252000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:58.252000 audit[2894]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000abeba0 a1=40011801e0 a2=4000abeb70 a3=25 items=0 ppid=1 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.289451 kernel: audit: type=1401 audit(1712946178.252:974): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:58.289610 kernel: audit: type=1300 audit(1712946178.252:974): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000abeba0 a1=40011801e0 a2=4000abeb70 a3=25 items=0 ppid=1 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.252000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:58.318580 kernel: audit: type=1327 audit(1712946178.252:974): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:58.335099 kubelet[2894]: I0412 18:22:58.335054 2894 topology_manager.go:215] "Topology Admit Handler" podUID="a949e4ca7f9de0090cc90aae3d3da05d" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-28-18" Apr 12 18:22:58.336299 kubelet[2894]: I0412 18:22:58.335502 2894 topology_manager.go:215] "Topology Admit Handler" podUID="3678970afa7197328e5e547307831875" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:58.336744 kubelet[2894]: I0412 18:22:58.336712 2894 topology_manager.go:215] "Topology Admit Handler" podUID="082f829d4b804c58cf5d03d1d32f2e56" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-28-18" Apr 12 18:22:58.346295 kubelet[2894]: I0412 18:22:58.346127 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a949e4ca7f9de0090cc90aae3d3da05d-k8s-certs\") pod \"kube-apiserver-ip-172-31-28-18\" (UID: \"a949e4ca7f9de0090cc90aae3d3da05d\") " pod="kube-system/kube-apiserver-ip-172-31-28-18" Apr 12 18:22:58.346667 kubelet[2894]: I0412 18:22:58.346619 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:58.346978 kubelet[2894]: I0412 18:22:58.346933 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/082f829d4b804c58cf5d03d1d32f2e56-kubeconfig\") pod \"kube-scheduler-ip-172-31-28-18\" (UID: \"082f829d4b804c58cf5d03d1d32f2e56\") " pod="kube-system/kube-scheduler-ip-172-31-28-18" Apr 12 18:22:58.347257 kubelet[2894]: I0412 18:22:58.347153 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-kubeconfig\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:58.347592 kubelet[2894]: I0412 18:22:58.347534 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a949e4ca7f9de0090cc90aae3d3da05d-ca-certs\") pod \"kube-apiserver-ip-172-31-28-18\" (UID: \"a949e4ca7f9de0090cc90aae3d3da05d\") " pod="kube-system/kube-apiserver-ip-172-31-28-18" Apr 12 18:22:58.347863 kubelet[2894]: I0412 18:22:58.347783 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a949e4ca7f9de0090cc90aae3d3da05d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-28-18\" (UID: \"a949e4ca7f9de0090cc90aae3d3da05d\") " pod="kube-system/kube-apiserver-ip-172-31-28-18" Apr 12 18:22:58.348072 kubelet[2894]: I0412 18:22:58.348049 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-ca-certs\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:58.348337 kubelet[2894]: I0412 18:22:58.348302 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:58.348566 kubelet[2894]: I0412 18:22:58.348522 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3678970afa7197328e5e547307831875-k8s-certs\") pod \"kube-controller-manager-ip-172-31-28-18\" (UID: \"3678970afa7197328e5e547307831875\") " pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:58.355344 kubelet[2894]: E0412 18:22:58.355272 2894 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-28-18\" already exists" pod="kube-system/kube-apiserver-ip-172-31-28-18" Apr 12 18:22:58.914281 kubelet[2894]: I0412 18:22:58.914205 2894 apiserver.go:52] "Watching apiserver" Apr 12 18:22:58.943648 kubelet[2894]: I0412 18:22:58.943584 2894 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:22:59.256708 kubelet[2894]: E0412 18:22:59.256667 2894 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-28-18\" already exists" pod="kube-system/kube-apiserver-ip-172-31-28-18" Apr 12 18:22:59.258144 kubelet[2894]: E0412 18:22:59.258106 2894 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-28-18\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-28-18" Apr 12 18:22:59.364769 kubelet[2894]: I0412 18:22:59.364705 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-28-18" podStartSLOduration=1.364640678 podStartE2EDuration="1.364640678s" podCreationTimestamp="2024-04-12 18:22:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:22:59.33897229 +0000 UTC m=+1.629616499" watchObservedRunningTime="2024-04-12 18:22:59.364640678 +0000 UTC m=+1.655284875" Apr 12 18:22:59.391373 kubelet[2894]: I0412 18:22:59.391328 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-28-18" podStartSLOduration=1.391241507 podStartE2EDuration="1.391241507s" podCreationTimestamp="2024-04-12 18:22:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:22:59.366713795 +0000 UTC m=+1.657357980" watchObservedRunningTime="2024-04-12 18:22:59.391241507 +0000 UTC m=+1.681885692" Apr 12 18:23:02.265132 sudo[1952]: pam_unix(sudo:session): session closed for user root Apr 12 18:23:02.264000 audit[1952]: USER_END pid=1952 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:23:02.267000 audit[1952]: CRED_DISP pid=1952 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:23:02.283336 kernel: audit: type=1106 audit(1712946182.264:975): pid=1952 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:23:02.283471 kernel: audit: type=1104 audit(1712946182.267:976): pid=1952 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:23:02.291528 sshd[1949]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:02.292000 audit[1949]: USER_END pid=1949 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:02.296544 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:23:02.296841 systemd[1]: session-7.scope: Consumed 12.104s CPU time. Apr 12 18:23:02.298067 systemd[1]: sshd@6-172.31.28.18:22-139.178.89.65:59864.service: Deactivated successfully. Apr 12 18:23:02.292000 audit[1949]: CRED_DISP pid=1949 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:02.306322 systemd-logind[1678]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:23:02.315426 kernel: audit: type=1106 audit(1712946182.292:977): pid=1949 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:02.315545 kernel: audit: type=1104 audit(1712946182.292:978): pid=1949 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:02.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.18:22-139.178.89.65:59864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:02.325190 systemd-logind[1678]: Removed session 7. Apr 12 18:23:02.327256 kernel: audit: type=1131 audit(1712946182.297:979): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.18:22-139.178.89.65:59864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:09.265333 kubelet[2894]: I0412 18:23:09.265026 2894 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:23:09.266776 env[1686]: time="2024-04-12T18:23:09.266706788Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:23:09.267887 kubelet[2894]: I0412 18:23:09.267833 2894 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:23:09.905842 kubelet[2894]: I0412 18:23:09.905796 2894 topology_manager.go:215] "Topology Admit Handler" podUID="2303d982-9622-4ae7-9774-693b49466edd" podNamespace="kube-system" podName="kube-proxy-dmzmk" Apr 12 18:23:09.916153 systemd[1]: Created slice kubepods-besteffort-pod2303d982_9622_4ae7_9774_693b49466edd.slice. Apr 12 18:23:10.016094 kubelet[2894]: I0412 18:23:10.016016 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2303d982-9622-4ae7-9774-693b49466edd-xtables-lock\") pod \"kube-proxy-dmzmk\" (UID: \"2303d982-9622-4ae7-9774-693b49466edd\") " pod="kube-system/kube-proxy-dmzmk" Apr 12 18:23:10.016335 kubelet[2894]: I0412 18:23:10.016146 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2303d982-9622-4ae7-9774-693b49466edd-kube-proxy\") pod \"kube-proxy-dmzmk\" (UID: \"2303d982-9622-4ae7-9774-693b49466edd\") " pod="kube-system/kube-proxy-dmzmk" Apr 12 18:23:10.016335 kubelet[2894]: I0412 18:23:10.016255 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2303d982-9622-4ae7-9774-693b49466edd-lib-modules\") pod \"kube-proxy-dmzmk\" (UID: \"2303d982-9622-4ae7-9774-693b49466edd\") " pod="kube-system/kube-proxy-dmzmk" Apr 12 18:23:10.016481 kubelet[2894]: I0412 18:23:10.016338 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xtms2\" (UniqueName: \"kubernetes.io/projected/2303d982-9622-4ae7-9774-693b49466edd-kube-api-access-xtms2\") pod \"kube-proxy-dmzmk\" (UID: \"2303d982-9622-4ae7-9774-693b49466edd\") " pod="kube-system/kube-proxy-dmzmk" Apr 12 18:23:10.231606 env[1686]: time="2024-04-12T18:23:10.231550793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dmzmk,Uid:2303d982-9622-4ae7-9774-693b49466edd,Namespace:kube-system,Attempt:0,}" Apr 12 18:23:10.267053 env[1686]: time="2024-04-12T18:23:10.266884535Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:10.267751 env[1686]: time="2024-04-12T18:23:10.267004214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:10.267751 env[1686]: time="2024-04-12T18:23:10.267078352Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:10.267919 env[1686]: time="2024-04-12T18:23:10.267832525Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/612465a675c865b0526f875d3538d86f4b958c1f2bfd1ee8fe7eb7b3b19f9541 pid=2976 runtime=io.containerd.runc.v2 Apr 12 18:23:10.335999 systemd[1]: Started cri-containerd-612465a675c865b0526f875d3538d86f4b958c1f2bfd1ee8fe7eb7b3b19f9541.scope. Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.399012 kernel: audit: type=1400 audit(1712946190.378:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.399130 kernel: audit: type=1400 audit(1712946190.378:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.420098 kernel: audit: type=1400 audit(1712946190.378:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.431975 kernel: audit: type=1400 audit(1712946190.378:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.444920 kernel: audit: type=1400 audit(1712946190.378:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.446334 kubelet[2894]: I0412 18:23:10.446247 2894 topology_manager.go:215] "Topology Admit Handler" podUID="0be6096d-75ce-4538-a0fc-fce0838e5c6a" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-6q6fq" Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.462508 kernel: audit: type=1400 audit(1712946190.378:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.462671 kernel: audit: type=1400 audit(1712946190.378:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.460897 systemd[1]: Created slice kubepods-besteffort-pod0be6096d_75ce_4538_a0fc_fce0838e5c6a.slice. Apr 12 18:23:10.462866 env[1686]: time="2024-04-12T18:23:10.462264244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dmzmk,Uid:2303d982-9622-4ae7-9774-693b49466edd,Namespace:kube-system,Attempt:0,} returns sandbox id \"612465a675c865b0526f875d3538d86f4b958c1f2bfd1ee8fe7eb7b3b19f9541\"" Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.471156 kernel: audit: type=1400 audit(1712946190.378:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.481043 kernel: audit: type=1400 audit(1712946190.378:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.489001 kernel: audit: type=1400 audit(1712946190.386:989): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit: BPF prog-id=112 op=LOAD Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631323436356136373563383635623035323666383735643335333864 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631323436356136373563383635623035323666383735643335333864 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.386000 audit: BPF prog-id=113 op=LOAD Apr 12 18:23:10.386000 audit[2986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631323436356136373563383635623035323666383735643335333864 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit: BPF prog-id=114 op=LOAD Apr 12 18:23:10.387000 audit[2986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631323436356136373563383635623035323666383735643335333864 Apr 12 18:23:10.387000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:23:10.387000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.387000 audit: BPF prog-id=115 op=LOAD Apr 12 18:23:10.387000 audit[2986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631323436356136373563383635623035323666383735643335333864 Apr 12 18:23:10.496834 env[1686]: time="2024-04-12T18:23:10.496608222Z" level=info msg="CreateContainer within sandbox \"612465a675c865b0526f875d3538d86f4b958c1f2bfd1ee8fe7eb7b3b19f9541\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:23:10.527354 env[1686]: time="2024-04-12T18:23:10.527258150Z" level=info msg="CreateContainer within sandbox \"612465a675c865b0526f875d3538d86f4b958c1f2bfd1ee8fe7eb7b3b19f9541\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"236677cee9adfe25b55299dadd6daebf36ef87e5ab6c5afb1f318f40c66fab6e\"" Apr 12 18:23:10.530117 env[1686]: time="2024-04-12T18:23:10.528570878Z" level=info msg="StartContainer for \"236677cee9adfe25b55299dadd6daebf36ef87e5ab6c5afb1f318f40c66fab6e\"" Apr 12 18:23:10.563271 systemd[1]: Started cri-containerd-236677cee9adfe25b55299dadd6daebf36ef87e5ab6c5afb1f318f40c66fab6e.scope. Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2976 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363637376365653961646665323562353532393964616464366461 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.599000 audit: BPF prog-id=116 op=LOAD Apr 12 18:23:10.599000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2976 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363637376365653961646665323562353532393964616464366461 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.601000 audit: BPF prog-id=117 op=LOAD Apr 12 18:23:10.601000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2976 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363637376365653961646665323562353532393964616464366461 Apr 12 18:23:10.602000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:23:10.602000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.603000 audit: BPF prog-id=118 op=LOAD Apr 12 18:23:10.603000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2976 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363637376365653961646665323562353532393964616464366461 Apr 12 18:23:10.628521 kubelet[2894]: I0412 18:23:10.626578 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fk696\" (UniqueName: \"kubernetes.io/projected/0be6096d-75ce-4538-a0fc-fce0838e5c6a-kube-api-access-fk696\") pod \"tigera-operator-6bfc79cb9c-6q6fq\" (UID: \"0be6096d-75ce-4538-a0fc-fce0838e5c6a\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-6q6fq" Apr 12 18:23:10.628521 kubelet[2894]: I0412 18:23:10.628399 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0be6096d-75ce-4538-a0fc-fce0838e5c6a-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-6q6fq\" (UID: \"0be6096d-75ce-4538-a0fc-fce0838e5c6a\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-6q6fq" Apr 12 18:23:10.641385 env[1686]: time="2024-04-12T18:23:10.641199706Z" level=info msg="StartContainer for \"236677cee9adfe25b55299dadd6daebf36ef87e5ab6c5afb1f318f40c66fab6e\" returns successfully" Apr 12 18:23:10.764000 audit[3070]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.764000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc012eef0 a2=0 a3=1 items=0 ppid=3027 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:23:10.771000 audit[3071]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3071 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:10.771000 audit[3071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffbe66f20 a2=0 a3=1 items=0 ppid=3027 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:23:10.773000 audit[3072]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3072 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.773000 audit[3072]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd40f0220 a2=0 a3=1 items=0 ppid=3027 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:23:10.781732 env[1686]: time="2024-04-12T18:23:10.781660088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-6q6fq,Uid:0be6096d-75ce-4538-a0fc-fce0838e5c6a,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:23:10.783000 audit[3073]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:10.783000 audit[3073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffedd0c9f0 a2=0 a3=1 items=0 ppid=3027 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:23:10.785000 audit[3074]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.785000 audit[3074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc16880d0 a2=0 a3=1 items=0 ppid=3027 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:23:10.787000 audit[3075]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3075 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:10.787000 audit[3075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa930a90 a2=0 a3=1 items=0 ppid=3027 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:23:10.810163 env[1686]: time="2024-04-12T18:23:10.809995751Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:10.810382 env[1686]: time="2024-04-12T18:23:10.810181781Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:10.810382 env[1686]: time="2024-04-12T18:23:10.810285896Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:10.810824 env[1686]: time="2024-04-12T18:23:10.810737312Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78d3dd7f1f286ce1c0c3b64466947eae34145202a64c899d09f299540642cb54 pid=3082 runtime=io.containerd.runc.v2 Apr 12 18:23:10.835682 systemd[1]: Started cri-containerd-78d3dd7f1f286ce1c0c3b64466947eae34145202a64c899d09f299540642cb54.scope. Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.868000 audit: BPF prog-id=119 op=LOAD Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3082 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643364643766316632383663653163306333623634343636393437 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3082 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643364643766316632383663653163306333623634343636393437 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.870000 audit: BPF prog-id=120 op=LOAD Apr 12 18:23:10.870000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3082 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643364643766316632383663653163306333623634343636393437 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.871000 audit: BPF prog-id=121 op=LOAD Apr 12 18:23:10.871000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3082 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643364643766316632383663653163306333623634343636393437 Apr 12 18:23:10.871000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:23:10.871000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:10.872000 audit: BPF prog-id=122 op=LOAD Apr 12 18:23:10.872000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3082 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643364643766316632383663653163306333623634343636393437 Apr 12 18:23:10.874000 audit[3111]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.874000 audit[3111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd1333460 a2=0 a3=1 items=0 ppid=3027 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:23:10.886000 audit[3113]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.886000 audit[3113]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc1d05cf0 a2=0 a3=1 items=0 ppid=3027 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:23:10.896000 audit[3116]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.896000 audit[3116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc3423e90 a2=0 a3=1 items=0 ppid=3027 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:23:10.906000 audit[3117]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.906000 audit[3117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffffd60d20 a2=0 a3=1 items=0 ppid=3027 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:23:10.916000 audit[3125]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.916000 audit[3125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcb17f980 a2=0 a3=1 items=0 ppid=3027 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:23:10.920615 env[1686]: time="2024-04-12T18:23:10.920552338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-6q6fq,Uid:0be6096d-75ce-4538-a0fc-fce0838e5c6a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"78d3dd7f1f286ce1c0c3b64466947eae34145202a64c899d09f299540642cb54\"" Apr 12 18:23:10.924141 env[1686]: time="2024-04-12T18:23:10.924089916Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:23:10.927000 audit[3126]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.927000 audit[3126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe74a6d90 a2=0 a3=1 items=0 ppid=3027 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:23:10.934000 audit[3128]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.934000 audit[3128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc733f6f0 a2=0 a3=1 items=0 ppid=3027 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:23:10.943000 audit[3131]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.943000 audit[3131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff03cbf70 a2=0 a3=1 items=0 ppid=3027 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:23:10.945000 audit[3132]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.945000 audit[3132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5d18a00 a2=0 a3=1 items=0 ppid=3027 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:23:10.953000 audit[3134]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.953000 audit[3134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffd5774b0 a2=0 a3=1 items=0 ppid=3027 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:23:10.955000 audit[3135]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.955000 audit[3135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeeea71c0 a2=0 a3=1 items=0 ppid=3027 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:23:10.960000 audit[3137]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.960000 audit[3137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdabb3860 a2=0 a3=1 items=0 ppid=3027 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:23:10.969000 audit[3140]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.969000 audit[3140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed94d9a0 a2=0 a3=1 items=0 ppid=3027 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:23:10.978000 audit[3143]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.978000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd4cc840 a2=0 a3=1 items=0 ppid=3027 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:23:10.980000 audit[3144]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.980000 audit[3144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffde7641b0 a2=0 a3=1 items=0 ppid=3027 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:23:10.985000 audit[3146]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.985000 audit[3146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe0ce0f50 a2=0 a3=1 items=0 ppid=3027 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:23:10.993000 audit[3149]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.993000 audit[3149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffebac7160 a2=0 a3=1 items=0 ppid=3027 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:23:10.996000 audit[3150]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:10.996000 audit[3150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7b9c0d0 a2=0 a3=1 items=0 ppid=3027 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:10.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:23:11.002000 audit[3152]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:11.002000 audit[3152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffce168450 a2=0 a3=1 items=0 ppid=3027 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:23:11.046000 audit[3158]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:11.046000 audit[3158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffd0b3cf20 a2=0 a3=1 items=0 ppid=3027 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:11.060000 audit[3158]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:11.060000 audit[3158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffd0b3cf20 a2=0 a3=1 items=0 ppid=3027 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:11.064000 audit[3163]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.064000 audit[3163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff9e0a650 a2=0 a3=1 items=0 ppid=3027 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:23:11.069000 audit[3165]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.069000 audit[3165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffea7680d0 a2=0 a3=1 items=0 ppid=3027 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:23:11.077000 audit[3168]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.077000 audit[3168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe90e9dc0 a2=0 a3=1 items=0 ppid=3027 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:23:11.079000 audit[3169]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.079000 audit[3169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff343bf80 a2=0 a3=1 items=0 ppid=3027 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:23:11.084000 audit[3171]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.084000 audit[3171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe8b829b0 a2=0 a3=1 items=0 ppid=3027 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:23:11.086000 audit[3172]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.086000 audit[3172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc926210 a2=0 a3=1 items=0 ppid=3027 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:23:11.092000 audit[3174]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.092000 audit[3174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc462b910 a2=0 a3=1 items=0 ppid=3027 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:23:11.099000 audit[3177]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.099000 audit[3177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe4b52770 a2=0 a3=1 items=0 ppid=3027 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:23:11.102000 audit[3178]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.102000 audit[3178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2b88010 a2=0 a3=1 items=0 ppid=3027 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:23:11.107000 audit[3180]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.107000 audit[3180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd25983c0 a2=0 a3=1 items=0 ppid=3027 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:23:11.110000 audit[3181]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.110000 audit[3181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9b862d0 a2=0 a3=1 items=0 ppid=3027 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:23:11.116000 audit[3183]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.116000 audit[3183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd359db50 a2=0 a3=1 items=0 ppid=3027 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:23:11.123000 audit[3186]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.123000 audit[3186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe6f7a470 a2=0 a3=1 items=0 ppid=3027 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:23:11.132000 audit[3189]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.132000 audit[3189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcf749d90 a2=0 a3=1 items=0 ppid=3027 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:23:11.142000 audit[3190]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.142000 audit[3190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffff33be80 a2=0 a3=1 items=0 ppid=3027 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:23:11.153000 audit[3192]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.153000 audit[3192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffecf4dad0 a2=0 a3=1 items=0 ppid=3027 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:23:11.163000 audit[3195]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.163000 audit[3195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd0537610 a2=0 a3=1 items=0 ppid=3027 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:23:11.166000 audit[3196]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.166000 audit[3196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe11c12a0 a2=0 a3=1 items=0 ppid=3027 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:23:11.172000 audit[3198]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.172000 audit[3198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdf010950 a2=0 a3=1 items=0 ppid=3027 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:23:11.174000 audit[3199]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.174000 audit[3199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1870a90 a2=0 a3=1 items=0 ppid=3027 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:23:11.179000 audit[3201]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.179000 audit[3201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcfc44710 a2=0 a3=1 items=0 ppid=3027 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:23:11.186000 audit[3204]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:11.186000 audit[3204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffcb07040 a2=0 a3=1 items=0 ppid=3027 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:23:11.192000 audit[3206]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:23:11.192000 audit[3206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffdcbe0180 a2=0 a3=1 items=0 ppid=3027 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.192000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:11.194000 audit[3206]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:23:11.194000 audit[3206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdcbe0180 a2=0 a3=1 items=0 ppid=3027 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:11.194000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:11.817802 amazon-ssm-agent[1812]: 2024-04-12 18:23:11 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Apr 12 18:23:12.072681 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1067437788.mount: Deactivated successfully. Apr 12 18:23:13.262700 env[1686]: time="2024-04-12T18:23:13.262622158Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:13.266900 env[1686]: time="2024-04-12T18:23:13.266831122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:13.271856 env[1686]: time="2024-04-12T18:23:13.271785423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:13.275052 env[1686]: time="2024-04-12T18:23:13.275001569Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:13.276259 env[1686]: time="2024-04-12T18:23:13.276189788Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 18:23:13.282462 env[1686]: time="2024-04-12T18:23:13.282403097Z" level=info msg="CreateContainer within sandbox \"78d3dd7f1f286ce1c0c3b64466947eae34145202a64c899d09f299540642cb54\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:23:13.304284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2119007225.mount: Deactivated successfully. Apr 12 18:23:13.318493 env[1686]: time="2024-04-12T18:23:13.318429323Z" level=info msg="CreateContainer within sandbox \"78d3dd7f1f286ce1c0c3b64466947eae34145202a64c899d09f299540642cb54\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131\"" Apr 12 18:23:13.319689 env[1686]: time="2024-04-12T18:23:13.319639838Z" level=info msg="StartContainer for \"d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131\"" Apr 12 18:23:13.360792 systemd[1]: Started cri-containerd-d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131.scope. Apr 12 18:23:13.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.401000 audit: BPF prog-id=123 op=LOAD Apr 12 18:23:13.402000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.402000 audit[3215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3082 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313131653632343638616435313738666433626564643162306335 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3082 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313131653632343638616435313738666433626564643162306335 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.403000 audit: BPF prog-id=124 op=LOAD Apr 12 18:23:13.403000 audit[3215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3082 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313131653632343638616435313738666433626564643162306335 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.405000 audit: BPF prog-id=125 op=LOAD Apr 12 18:23:13.405000 audit[3215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3082 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313131653632343638616435313738666433626564643162306335 Apr 12 18:23:13.406000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:23:13.407000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.407000 audit: BPF prog-id=126 op=LOAD Apr 12 18:23:13.407000 audit[3215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3082 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313131653632343638616435313738666433626564643162306335 Apr 12 18:23:13.438712 env[1686]: time="2024-04-12T18:23:13.438626535Z" level=info msg="StartContainer for \"d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131\" returns successfully" Apr 12 18:23:14.252004 kubelet[2894]: I0412 18:23:14.251956 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-dmzmk" podStartSLOduration=5.25187455 podStartE2EDuration="5.25187455s" podCreationTimestamp="2024-04-12 18:23:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:23:11.246330303 +0000 UTC m=+13.536974512" watchObservedRunningTime="2024-04-12 18:23:14.25187455 +0000 UTC m=+16.542518771" Apr 12 18:23:16.385000 audit[3247]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:16.388670 kernel: kauditd_printk_skb: 357 callbacks suppressed Apr 12 18:23:16.388806 kernel: audit: type=1325 audit(1712946196.385:1091): table=filter:89 family=2 entries=14 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:16.385000 audit[3247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff0216470 a2=0 a3=1 items=0 ppid=3027 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:16.405858 kernel: audit: type=1300 audit(1712946196.385:1091): arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff0216470 a2=0 a3=1 items=0 ppid=3027 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:16.405975 kernel: audit: type=1327 audit(1712946196.385:1091): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:16.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:16.385000 audit[3247]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:16.417775 kernel: audit: type=1325 audit(1712946196.385:1092): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:16.417930 kernel: audit: type=1300 audit(1712946196.385:1092): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff0216470 a2=0 a3=1 items=0 ppid=3027 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:16.385000 audit[3247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff0216470 a2=0 a3=1 items=0 ppid=3027 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:16.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:16.434741 kernel: audit: type=1327 audit(1712946196.385:1092): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:16.428000 audit[3249]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=3249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:16.428000 audit[3249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc79abbc0 a2=0 a3=1 items=0 ppid=3027 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:16.452545 kernel: audit: type=1325 audit(1712946196.428:1093): table=filter:91 family=2 entries=15 op=nft_register_rule pid=3249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:16.452655 kernel: audit: type=1300 audit(1712946196.428:1093): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc79abbc0 a2=0 a3=1 items=0 ppid=3027 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:16.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:16.458721 kernel: audit: type=1327 audit(1712946196.428:1093): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:16.434000 audit[3249]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:16.434000 audit[3249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc79abbc0 a2=0 a3=1 items=0 ppid=3027 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:16.434000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:16.467270 kernel: audit: type=1325 audit(1712946196.434:1094): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:16.544053 kubelet[2894]: I0412 18:23:16.544006 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-6q6fq" podStartSLOduration=4.189933055 podStartE2EDuration="6.543943726s" podCreationTimestamp="2024-04-12 18:23:10 +0000 UTC" firstStartedPulling="2024-04-12 18:23:10.922740382 +0000 UTC m=+13.213384579" lastFinishedPulling="2024-04-12 18:23:13.276751053 +0000 UTC m=+15.567395250" observedRunningTime="2024-04-12 18:23:14.253831072 +0000 UTC m=+16.544475257" watchObservedRunningTime="2024-04-12 18:23:16.543943726 +0000 UTC m=+18.834587935" Apr 12 18:23:16.545047 kubelet[2894]: I0412 18:23:16.545011 2894 topology_manager.go:215] "Topology Admit Handler" podUID="0f2f3112-800e-4621-935b-7aeca39e71df" podNamespace="calico-system" podName="calico-typha-685b99d7f-7szsc" Apr 12 18:23:16.560623 systemd[1]: Created slice kubepods-besteffort-pod0f2f3112_800e_4621_935b_7aeca39e71df.slice. Apr 12 18:23:16.570982 kubelet[2894]: I0412 18:23:16.570930 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t2t2q\" (UniqueName: \"kubernetes.io/projected/0f2f3112-800e-4621-935b-7aeca39e71df-kube-api-access-t2t2q\") pod \"calico-typha-685b99d7f-7szsc\" (UID: \"0f2f3112-800e-4621-935b-7aeca39e71df\") " pod="calico-system/calico-typha-685b99d7f-7szsc" Apr 12 18:23:16.571170 kubelet[2894]: I0412 18:23:16.571032 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0f2f3112-800e-4621-935b-7aeca39e71df-typha-certs\") pod \"calico-typha-685b99d7f-7szsc\" (UID: \"0f2f3112-800e-4621-935b-7aeca39e71df\") " pod="calico-system/calico-typha-685b99d7f-7szsc" Apr 12 18:23:16.571170 kubelet[2894]: I0412 18:23:16.571110 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0f2f3112-800e-4621-935b-7aeca39e71df-tigera-ca-bundle\") pod \"calico-typha-685b99d7f-7szsc\" (UID: \"0f2f3112-800e-4621-935b-7aeca39e71df\") " pod="calico-system/calico-typha-685b99d7f-7szsc" Apr 12 18:23:16.738734 kubelet[2894]: I0412 18:23:16.738664 2894 topology_manager.go:215] "Topology Admit Handler" podUID="0b62b52e-6b7a-497c-bb15-794cded25e50" podNamespace="calico-system" podName="calico-node-4c6md" Apr 12 18:23:16.751572 systemd[1]: Created slice kubepods-besteffort-pod0b62b52e_6b7a_497c_bb15_794cded25e50.slice. Apr 12 18:23:16.773642 kubelet[2894]: I0412 18:23:16.773475 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-cni-bin-dir\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.773956 kubelet[2894]: I0412 18:23:16.773913 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-cni-log-dir\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.774471 kubelet[2894]: I0412 18:23:16.774269 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0b62b52e-6b7a-497c-bb15-794cded25e50-node-certs\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.774750 kubelet[2894]: I0412 18:23:16.774707 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-var-lib-calico\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.774935 kubelet[2894]: I0412 18:23:16.774898 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-lib-modules\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.775119 kubelet[2894]: I0412 18:23:16.775083 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q9qqg\" (UniqueName: \"kubernetes.io/projected/0b62b52e-6b7a-497c-bb15-794cded25e50-kube-api-access-q9qqg\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.775444 kubelet[2894]: I0412 18:23:16.775296 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-flexvol-driver-host\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.775752 kubelet[2894]: I0412 18:23:16.775470 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-var-run-calico\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.776083 kubelet[2894]: I0412 18:23:16.776014 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-xtables-lock\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.776175 kubelet[2894]: I0412 18:23:16.776117 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-policysync\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.776307 kubelet[2894]: I0412 18:23:16.776271 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0b62b52e-6b7a-497c-bb15-794cded25e50-tigera-ca-bundle\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.776463 kubelet[2894]: I0412 18:23:16.776427 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0b62b52e-6b7a-497c-bb15-794cded25e50-cni-net-dir\") pod \"calico-node-4c6md\" (UID: \"0b62b52e-6b7a-497c-bb15-794cded25e50\") " pod="calico-system/calico-node-4c6md" Apr 12 18:23:16.854051 kubelet[2894]: I0412 18:23:16.853966 2894 topology_manager.go:215] "Topology Admit Handler" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" podNamespace="calico-system" podName="csi-node-driver-lfznj" Apr 12 18:23:16.854492 kubelet[2894]: E0412 18:23:16.854440 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lfznj" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" Apr 12 18:23:16.869838 env[1686]: time="2024-04-12T18:23:16.869281664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-685b99d7f-7szsc,Uid:0f2f3112-800e-4621-935b-7aeca39e71df,Namespace:calico-system,Attempt:0,}" Apr 12 18:23:16.877356 kubelet[2894]: I0412 18:23:16.877304 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5a542a1c-abc5-4d55-b62e-65acb2779493-kubelet-dir\") pod \"csi-node-driver-lfznj\" (UID: \"5a542a1c-abc5-4d55-b62e-65acb2779493\") " pod="calico-system/csi-node-driver-lfznj" Apr 12 18:23:16.877529 kubelet[2894]: I0412 18:23:16.877497 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5a542a1c-abc5-4d55-b62e-65acb2779493-registration-dir\") pod \"csi-node-driver-lfznj\" (UID: \"5a542a1c-abc5-4d55-b62e-65acb2779493\") " pod="calico-system/csi-node-driver-lfznj" Apr 12 18:23:16.877655 kubelet[2894]: I0412 18:23:16.877622 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5a542a1c-abc5-4d55-b62e-65acb2779493-socket-dir\") pod \"csi-node-driver-lfznj\" (UID: \"5a542a1c-abc5-4d55-b62e-65acb2779493\") " pod="calico-system/csi-node-driver-lfznj" Apr 12 18:23:16.877777 kubelet[2894]: I0412 18:23:16.877683 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5a542a1c-abc5-4d55-b62e-65acb2779493-varrun\") pod \"csi-node-driver-lfznj\" (UID: \"5a542a1c-abc5-4d55-b62e-65acb2779493\") " pod="calico-system/csi-node-driver-lfznj" Apr 12 18:23:16.877853 kubelet[2894]: I0412 18:23:16.877812 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g7hf6\" (UniqueName: \"kubernetes.io/projected/5a542a1c-abc5-4d55-b62e-65acb2779493-kube-api-access-g7hf6\") pod \"csi-node-driver-lfznj\" (UID: \"5a542a1c-abc5-4d55-b62e-65acb2779493\") " pod="calico-system/csi-node-driver-lfznj" Apr 12 18:23:16.903257 kubelet[2894]: E0412 18:23:16.899435 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.903257 kubelet[2894]: W0412 18:23:16.899486 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.903257 kubelet[2894]: E0412 18:23:16.899528 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.928338 kubelet[2894]: E0412 18:23:16.928283 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.928516 kubelet[2894]: W0412 18:23:16.928392 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.928516 kubelet[2894]: E0412 18:23:16.928450 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.948858 env[1686]: time="2024-04-12T18:23:16.948670410Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:16.948858 env[1686]: time="2024-04-12T18:23:16.948751046Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:16.948858 env[1686]: time="2024-04-12T18:23:16.948778428Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:16.949584 env[1686]: time="2024-04-12T18:23:16.949460235Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c273b57e3658db8a54af9743c4e788c880dc3fa335bcbaadbd8d7d4c0b7f6d34 pid=3261 runtime=io.containerd.runc.v2 Apr 12 18:23:16.949733 kubelet[2894]: E0412 18:23:16.949708 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.949811 kubelet[2894]: W0412 18:23:16.949734 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.949811 kubelet[2894]: E0412 18:23:16.949771 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.984205 systemd[1]: Started cri-containerd-c273b57e3658db8a54af9743c4e788c880dc3fa335bcbaadbd8d7d4c0b7f6d34.scope. Apr 12 18:23:16.989342 kubelet[2894]: E0412 18:23:16.987475 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.989342 kubelet[2894]: W0412 18:23:16.987513 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.989342 kubelet[2894]: E0412 18:23:16.987552 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.989342 kubelet[2894]: E0412 18:23:16.987979 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.989342 kubelet[2894]: W0412 18:23:16.987997 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.989342 kubelet[2894]: E0412 18:23:16.988024 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.989342 kubelet[2894]: E0412 18:23:16.988355 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.989342 kubelet[2894]: W0412 18:23:16.988372 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.989342 kubelet[2894]: E0412 18:23:16.988398 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.989342 kubelet[2894]: E0412 18:23:16.988687 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.989953 kubelet[2894]: W0412 18:23:16.988703 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.989953 kubelet[2894]: E0412 18:23:16.988727 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.989953 kubelet[2894]: E0412 18:23:16.989076 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.989953 kubelet[2894]: W0412 18:23:16.989096 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.989953 kubelet[2894]: E0412 18:23:16.989124 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.995298 kubelet[2894]: E0412 18:23:16.993192 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.995298 kubelet[2894]: W0412 18:23:16.993281 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:16.995298 kubelet[2894]: E0412 18:23:16.993329 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:16.995992 kubelet[2894]: E0412 18:23:16.995949 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:16.995992 kubelet[2894]: W0412 18:23:16.995985 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.002252 kubelet[2894]: E0412 18:23:16.996458 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.002252 kubelet[2894]: W0412 18:23:16.996492 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.002252 kubelet[2894]: E0412 18:23:16.996861 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.002252 kubelet[2894]: W0412 18:23:16.996885 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.002252 kubelet[2894]: E0412 18:23:16.997238 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.002252 kubelet[2894]: W0412 18:23:16.997259 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.002252 kubelet[2894]: E0412 18:23:16.997714 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.002252 kubelet[2894]: W0412 18:23:16.997736 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.002252 kubelet[2894]: E0412 18:23:16.997768 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.002252 kubelet[2894]: E0412 18:23:16.998203 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.002920 kubelet[2894]: W0412 18:23:16.998330 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.002920 kubelet[2894]: E0412 18:23:16.998362 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.002920 kubelet[2894]: E0412 18:23:16.998755 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.002920 kubelet[2894]: W0412 18:23:16.998778 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.002920 kubelet[2894]: E0412 18:23:16.998810 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.002920 kubelet[2894]: E0412 18:23:16.999176 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.002920 kubelet[2894]: W0412 18:23:16.999200 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.002920 kubelet[2894]: E0412 18:23:16.999273 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.005997 kubelet[2894]: E0412 18:23:17.005895 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.007076 kubelet[2894]: E0412 18:23:17.007015 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.012788 kubelet[2894]: E0412 18:23:17.008093 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.012788 kubelet[2894]: W0412 18:23:17.008163 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.012788 kubelet[2894]: E0412 18:23:17.008257 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.012788 kubelet[2894]: E0412 18:23:17.008984 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.012788 kubelet[2894]: W0412 18:23:17.009031 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.012788 kubelet[2894]: E0412 18:23:17.009102 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.012788 kubelet[2894]: E0412 18:23:17.012413 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.012788 kubelet[2894]: W0412 18:23:17.012444 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.012788 kubelet[2894]: E0412 18:23:17.012482 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.014301 kubelet[2894]: E0412 18:23:17.014263 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.014976 kubelet[2894]: E0412 18:23:17.014457 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.015279 kubelet[2894]: W0412 18:23:17.015201 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.015580 kubelet[2894]: E0412 18:23:17.015531 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.021258 kubelet[2894]: E0412 18:23:17.014733 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.028664 kubelet[2894]: E0412 18:23:17.028614 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.028939 kubelet[2894]: W0412 18:23:17.028897 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.029853 kubelet[2894]: E0412 18:23:17.029772 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.033008 kubelet[2894]: E0412 18:23:17.032942 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.033327 kubelet[2894]: W0412 18:23:17.033284 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.033472 kubelet[2894]: E0412 18:23:17.033450 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.034351 kubelet[2894]: E0412 18:23:17.034317 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.034556 kubelet[2894]: W0412 18:23:17.034527 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.034736 kubelet[2894]: E0412 18:23:17.034701 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.035970 kubelet[2894]: E0412 18:23:17.035916 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.036258 kubelet[2894]: W0412 18:23:17.036199 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.036467 kubelet[2894]: E0412 18:23:17.036428 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.037960 kubelet[2894]: E0412 18:23:17.037276 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.037960 kubelet[2894]: W0412 18:23:17.037313 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.037960 kubelet[2894]: E0412 18:23:17.037361 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.037960 kubelet[2894]: E0412 18:23:17.037779 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.037960 kubelet[2894]: W0412 18:23:17.037800 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.037960 kubelet[2894]: E0412 18:23:17.037829 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.038450 kubelet[2894]: E0412 18:23:17.038192 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.038450 kubelet[2894]: W0412 18:23:17.038241 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.038450 kubelet[2894]: E0412 18:23:17.038272 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.054077 kubelet[2894]: E0412 18:23:17.054014 2894 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:17.054077 kubelet[2894]: W0412 18:23:17.054052 2894 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:17.054394 kubelet[2894]: E0412 18:23:17.054091 2894 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:17.061873 env[1686]: time="2024-04-12T18:23:17.061323861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4c6md,Uid:0b62b52e-6b7a-497c-bb15-794cded25e50,Namespace:calico-system,Attempt:0,}" Apr 12 18:23:17.094561 env[1686]: time="2024-04-12T18:23:17.094420811Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:17.094726 env[1686]: time="2024-04-12T18:23:17.094588512Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:17.094726 env[1686]: time="2024-04-12T18:23:17.094673658Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:17.095090 env[1686]: time="2024-04-12T18:23:17.095002920Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5 pid=3326 runtime=io.containerd.runc.v2 Apr 12 18:23:17.135314 systemd[1]: Started cri-containerd-61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5.scope. Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.145000 audit: BPF prog-id=127 op=LOAD Apr 12 18:23:17.147000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.147000 audit[3274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3261 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373362353765333635386462386135346166393734336334653738 Apr 12 18:23:17.147000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.147000 audit[3274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3261 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373362353765333635386462386135346166393734336334653738 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.148000 audit: BPF prog-id=128 op=LOAD Apr 12 18:23:17.148000 audit[3274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3261 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373362353765333635386462386135346166393734336334653738 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.149000 audit: BPF prog-id=129 op=LOAD Apr 12 18:23:17.149000 audit[3274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3261 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373362353765333635386462386135346166393734336334653738 Apr 12 18:23:17.156000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:23:17.156000 audit: BPF prog-id=128 op=UNLOAD Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.156000 audit: BPF prog-id=130 op=LOAD Apr 12 18:23:17.156000 audit[3274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3261 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373362353765333635386462386135346166393734336334653738 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.176000 audit: BPF prog-id=131 op=LOAD Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3326 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383933666133363836363031643437386339373830346633303535 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3326 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383933666133363836363031643437386339373830346633303535 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit: BPF prog-id=132 op=LOAD Apr 12 18:23:17.177000 audit[3336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3326 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383933666133363836363031643437386339373830346633303535 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit: BPF prog-id=133 op=LOAD Apr 12 18:23:17.177000 audit[3336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3326 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383933666133363836363031643437386339373830346633303535 Apr 12 18:23:17.177000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:23:17.177000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:17.177000 audit: BPF prog-id=134 op=LOAD Apr 12 18:23:17.177000 audit[3336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3326 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383933666133363836363031643437386339373830346633303535 Apr 12 18:23:17.206660 env[1686]: time="2024-04-12T18:23:17.206587021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4c6md,Uid:0b62b52e-6b7a-497c-bb15-794cded25e50,Namespace:calico-system,Attempt:0,} returns sandbox id \"61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5\"" Apr 12 18:23:17.209715 env[1686]: time="2024-04-12T18:23:17.209655458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:23:17.272893 env[1686]: time="2024-04-12T18:23:17.272712818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-685b99d7f-7szsc,Uid:0f2f3112-800e-4621-935b-7aeca39e71df,Namespace:calico-system,Attempt:0,} returns sandbox id \"c273b57e3658db8a54af9743c4e788c880dc3fa335bcbaadbd8d7d4c0b7f6d34\"" Apr 12 18:23:17.472000 audit[3366]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:17.472000 audit[3366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffea178b50 a2=0 a3=1 items=0 ppid=3027 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:17.475000 audit[3366]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:17.475000 audit[3366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffea178b50 a2=0 a3=1 items=0 ppid=3027 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:17.475000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:18.025806 kubelet[2894]: E0412 18:23:18.025742 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lfznj" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" Apr 12 18:23:18.603616 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1019081371.mount: Deactivated successfully. Apr 12 18:23:18.779802 env[1686]: time="2024-04-12T18:23:18.779721081Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:18.784525 env[1686]: time="2024-04-12T18:23:18.784446903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:18.792204 env[1686]: time="2024-04-12T18:23:18.792128350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:18.796366 env[1686]: time="2024-04-12T18:23:18.796294196Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:18.798828 env[1686]: time="2024-04-12T18:23:18.797657811Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:23:18.800882 env[1686]: time="2024-04-12T18:23:18.800802670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:23:18.804470 env[1686]: time="2024-04-12T18:23:18.802804787Z" level=info msg="CreateContainer within sandbox \"61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:23:18.826310 env[1686]: time="2024-04-12T18:23:18.826194359Z" level=info msg="CreateContainer within sandbox \"61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584\"" Apr 12 18:23:18.827323 env[1686]: time="2024-04-12T18:23:18.827186500Z" level=info msg="StartContainer for \"746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584\"" Apr 12 18:23:18.877551 systemd[1]: Started cri-containerd-746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584.scope. Apr 12 18:23:18.894104 systemd[1]: run-containerd-runc-k8s.io-746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584-runc.SNEt7o.mount: Deactivated successfully. Apr 12 18:23:18.943000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.943000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3326 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:18.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363937346134656538396336363565336131333331396533616138 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.944000 audit: BPF prog-id=135 op=LOAD Apr 12 18:23:18.944000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3326 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:18.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363937346134656538396336363565336131333331396533616138 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.945000 audit: BPF prog-id=136 op=LOAD Apr 12 18:23:18.945000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3326 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:18.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363937346134656538396336363565336131333331396533616138 Apr 12 18:23:18.947000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:23:18.947000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:18.947000 audit: BPF prog-id=137 op=LOAD Apr 12 18:23:18.947000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3326 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:18.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363937346134656538396336363565336131333331396533616138 Apr 12 18:23:18.984126 env[1686]: time="2024-04-12T18:23:18.984041440Z" level=info msg="StartContainer for \"746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584\" returns successfully" Apr 12 18:23:19.018539 systemd[1]: cri-containerd-746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584.scope: Deactivated successfully. Apr 12 18:23:19.020000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:23:19.076943 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584-rootfs.mount: Deactivated successfully. Apr 12 18:23:19.275289 env[1686]: time="2024-04-12T18:23:19.275156145Z" level=info msg="shim disconnected" id=746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584 Apr 12 18:23:19.275677 env[1686]: time="2024-04-12T18:23:19.275297847Z" level=warning msg="cleaning up after shim disconnected" id=746974a4ee89c665e3a13319e3aa879bd3fd036a5355b4ad67b84b387822d584 namespace=k8s.io Apr 12 18:23:19.275677 env[1686]: time="2024-04-12T18:23:19.275321500Z" level=info msg="cleaning up dead shim" Apr 12 18:23:19.300125 env[1686]: time="2024-04-12T18:23:19.300028595Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:23:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3416 runtime=io.containerd.runc.v2\n" Apr 12 18:23:19.995660 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount967681980.mount: Deactivated successfully. Apr 12 18:23:20.027351 kubelet[2894]: E0412 18:23:20.027310 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lfznj" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" Apr 12 18:23:21.269273 env[1686]: time="2024-04-12T18:23:21.269160674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:21.275625 env[1686]: time="2024-04-12T18:23:21.275552396Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:21.282250 env[1686]: time="2024-04-12T18:23:21.282166008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:21.286383 env[1686]: time="2024-04-12T18:23:21.286310075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:21.288849 env[1686]: time="2024-04-12T18:23:21.287655643Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 18:23:21.289964 env[1686]: time="2024-04-12T18:23:21.289901126Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:23:21.321592 env[1686]: time="2024-04-12T18:23:21.321473853Z" level=info msg="CreateContainer within sandbox \"c273b57e3658db8a54af9743c4e788c880dc3fa335bcbaadbd8d7d4c0b7f6d34\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:23:21.348965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount596634540.mount: Deactivated successfully. Apr 12 18:23:21.358341 env[1686]: time="2024-04-12T18:23:21.358190743Z" level=info msg="CreateContainer within sandbox \"c273b57e3658db8a54af9743c4e788c880dc3fa335bcbaadbd8d7d4c0b7f6d34\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2b1829ba603fcff3d4657f62c649e943cabf3a1fbdd7dd2793c64ce87049ab7b\"" Apr 12 18:23:21.361120 env[1686]: time="2024-04-12T18:23:21.359522180Z" level=info msg="StartContainer for \"2b1829ba603fcff3d4657f62c649e943cabf3a1fbdd7dd2793c64ce87049ab7b\"" Apr 12 18:23:21.421759 systemd[1]: Started cri-containerd-2b1829ba603fcff3d4657f62c649e943cabf3a1fbdd7dd2793c64ce87049ab7b.scope. Apr 12 18:23:21.480021 kernel: kauditd_printk_skb: 166 callbacks suppressed Apr 12 18:23:21.480191 kernel: audit: type=1400 audit(1712946201.476:1140): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.501533 kernel: audit: type=1400 audit(1712946201.476:1141): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.501692 kernel: audit: type=1400 audit(1712946201.476:1142): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.515060 kernel: audit: type=1400 audit(1712946201.476:1143): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.529119 kernel: audit: type=1400 audit(1712946201.476:1144): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.539932 kernel: audit: type=1400 audit(1712946201.476:1145): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.551992 kernel: audit: type=1400 audit(1712946201.476:1146): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.562910 kernel: audit: type=1400 audit(1712946201.476:1147): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.572700 kernel: audit: type=1400 audit(1712946201.476:1148): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.582795 kernel: audit: type=1400 audit(1712946201.479:1149): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.479000 audit: BPF prog-id=138 op=LOAD Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3261 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:21.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313832396261363033666366663364343635376636326336343965 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3261 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:21.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313832396261363033666366663364343635376636326336343965 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.486000 audit: BPF prog-id=139 op=LOAD Apr 12 18:23:21.486000 audit[3442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3261 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:21.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313832396261363033666366663364343635376636326336343965 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.500000 audit: BPF prog-id=140 op=LOAD Apr 12 18:23:21.500000 audit[3442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3261 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:21.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313832396261363033666366663364343635376636326336343965 Apr 12 18:23:21.502000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:23:21.502000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:21.502000 audit: BPF prog-id=141 op=LOAD Apr 12 18:23:21.502000 audit[3442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3261 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:21.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313832396261363033666366663364343635376636326336343965 Apr 12 18:23:21.686513 env[1686]: time="2024-04-12T18:23:21.686451915Z" level=info msg="StartContainer for \"2b1829ba603fcff3d4657f62c649e943cabf3a1fbdd7dd2793c64ce87049ab7b\" returns successfully" Apr 12 18:23:22.027281 kubelet[2894]: E0412 18:23:22.025470 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lfznj" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" Apr 12 18:23:22.476569 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3889056671.mount: Deactivated successfully. Apr 12 18:23:23.280736 kubelet[2894]: I0412 18:23:23.280684 2894 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:23:24.026522 kubelet[2894]: E0412 18:23:24.026037 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lfznj" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" Apr 12 18:23:25.921932 env[1686]: time="2024-04-12T18:23:25.921859434Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:25.924795 env[1686]: time="2024-04-12T18:23:25.924732948Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:25.927626 env[1686]: time="2024-04-12T18:23:25.927577266Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:25.930430 env[1686]: time="2024-04-12T18:23:25.930367497Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:25.931807 env[1686]: time="2024-04-12T18:23:25.931744002Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:23:25.937597 env[1686]: time="2024-04-12T18:23:25.937538725Z" level=info msg="CreateContainer within sandbox \"61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:23:25.959329 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1722567574.mount: Deactivated successfully. Apr 12 18:23:25.974341 env[1686]: time="2024-04-12T18:23:25.974276417Z" level=info msg="CreateContainer within sandbox \"61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6b0a3681dd43957611037d75bca3e29c95f409a48aeb228f2da6d79c9507cdce\"" Apr 12 18:23:25.976427 env[1686]: time="2024-04-12T18:23:25.976366976Z" level=info msg="StartContainer for \"6b0a3681dd43957611037d75bca3e29c95f409a48aeb228f2da6d79c9507cdce\"" Apr 12 18:23:26.012723 systemd[1]: Started cri-containerd-6b0a3681dd43957611037d75bca3e29c95f409a48aeb228f2da6d79c9507cdce.scope. Apr 12 18:23:26.028313 kubelet[2894]: E0412 18:23:26.028257 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lfznj" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" Apr 12 18:23:26.064000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.064000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3326 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306133363831646434333935373631313033376437356263613365 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.066000 audit: BPF prog-id=142 op=LOAD Apr 12 18:23:26.066000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3326 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306133363831646434333935373631313033376437356263613365 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit: BPF prog-id=143 op=LOAD Apr 12 18:23:26.067000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3326 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306133363831646434333935373631313033376437356263613365 Apr 12 18:23:26.067000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:23:26.067000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.067000 audit: BPF prog-id=144 op=LOAD Apr 12 18:23:26.067000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3326 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306133363831646434333935373631313033376437356263613365 Apr 12 18:23:26.097302 env[1686]: time="2024-04-12T18:23:26.097181284Z" level=info msg="StartContainer for \"6b0a3681dd43957611037d75bca3e29c95f409a48aeb228f2da6d79c9507cdce\" returns successfully" Apr 12 18:23:26.324240 kubelet[2894]: I0412 18:23:26.324132 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-685b99d7f-7szsc" podStartSLOduration=6.313106595 podStartE2EDuration="10.324044312s" podCreationTimestamp="2024-04-12 18:23:16 +0000 UTC" firstStartedPulling="2024-04-12 18:23:17.278266084 +0000 UTC m=+19.568910269" lastFinishedPulling="2024-04-12 18:23:21.289203789 +0000 UTC m=+23.579847986" observedRunningTime="2024-04-12 18:23:22.304592463 +0000 UTC m=+24.595236672" watchObservedRunningTime="2024-04-12 18:23:26.324044312 +0000 UTC m=+28.614688604" Apr 12 18:23:26.775419 env[1686]: time="2024-04-12T18:23:26.775345629Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:23:26.779997 systemd[1]: cri-containerd-6b0a3681dd43957611037d75bca3e29c95f409a48aeb228f2da6d79c9507cdce.scope: Deactivated successfully. Apr 12 18:23:26.784000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:23:26.786639 kernel: kauditd_printk_skb: 90 callbacks suppressed Apr 12 18:23:26.786767 kernel: audit: type=1334 audit(1712946206.784:1164): prog-id=144 op=UNLOAD Apr 12 18:23:26.809779 kubelet[2894]: I0412 18:23:26.809537 2894 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 18:23:26.830885 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6b0a3681dd43957611037d75bca3e29c95f409a48aeb228f2da6d79c9507cdce-rootfs.mount: Deactivated successfully. Apr 12 18:23:26.861270 kubelet[2894]: I0412 18:23:26.860965 2894 topology_manager.go:215] "Topology Admit Handler" podUID="f656056c-3cdf-40e9-84b2-2d3a77291360" podNamespace="kube-system" podName="coredns-76f75df574-dp8zd" Apr 12 18:23:26.875359 kubelet[2894]: I0412 18:23:26.875303 2894 topology_manager.go:215] "Topology Admit Handler" podUID="fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae" podNamespace="kube-system" podName="coredns-76f75df574-6q8rc" Apr 12 18:23:26.878532 systemd[1]: Created slice kubepods-burstable-podf656056c_3cdf_40e9_84b2_2d3a77291360.slice. Apr 12 18:23:26.881299 kubelet[2894]: I0412 18:23:26.881232 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f656056c-3cdf-40e9-84b2-2d3a77291360-config-volume\") pod \"coredns-76f75df574-dp8zd\" (UID: \"f656056c-3cdf-40e9-84b2-2d3a77291360\") " pod="kube-system/coredns-76f75df574-dp8zd" Apr 12 18:23:26.881481 kubelet[2894]: I0412 18:23:26.881307 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-259r6\" (UniqueName: \"kubernetes.io/projected/f656056c-3cdf-40e9-84b2-2d3a77291360-kube-api-access-259r6\") pod \"coredns-76f75df574-dp8zd\" (UID: \"f656056c-3cdf-40e9-84b2-2d3a77291360\") " pod="kube-system/coredns-76f75df574-dp8zd" Apr 12 18:23:26.890942 kubelet[2894]: I0412 18:23:26.889365 2894 topology_manager.go:215] "Topology Admit Handler" podUID="d4c29b30-48c4-46c1-a710-9d92004997a4" podNamespace="calico-system" podName="calico-kube-controllers-7c9b688b79-sqxnk" Apr 12 18:23:26.900709 systemd[1]: Created slice kubepods-burstable-podfd8c8cb4_7a74_45a4_ae27_c8e76b3a1eae.slice. Apr 12 18:23:26.920109 systemd[1]: Created slice kubepods-besteffort-podd4c29b30_48c4_46c1_a710_9d92004997a4.slice. Apr 12 18:23:26.981941 kubelet[2894]: I0412 18:23:26.981886 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nvs97\" (UniqueName: \"kubernetes.io/projected/d4c29b30-48c4-46c1-a710-9d92004997a4-kube-api-access-nvs97\") pod \"calico-kube-controllers-7c9b688b79-sqxnk\" (UID: \"d4c29b30-48c4-46c1-a710-9d92004997a4\") " pod="calico-system/calico-kube-controllers-7c9b688b79-sqxnk" Apr 12 18:23:26.982287 kubelet[2894]: I0412 18:23:26.981995 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae-config-volume\") pod \"coredns-76f75df574-6q8rc\" (UID: \"fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae\") " pod="kube-system/coredns-76f75df574-6q8rc" Apr 12 18:23:26.982287 kubelet[2894]: I0412 18:23:26.982115 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p8lsf\" (UniqueName: \"kubernetes.io/projected/fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae-kube-api-access-p8lsf\") pod \"coredns-76f75df574-6q8rc\" (UID: \"fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae\") " pod="kube-system/coredns-76f75df574-6q8rc" Apr 12 18:23:26.982287 kubelet[2894]: I0412 18:23:26.982249 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d4c29b30-48c4-46c1-a710-9d92004997a4-tigera-ca-bundle\") pod \"calico-kube-controllers-7c9b688b79-sqxnk\" (UID: \"d4c29b30-48c4-46c1-a710-9d92004997a4\") " pod="calico-system/calico-kube-controllers-7c9b688b79-sqxnk" Apr 12 18:23:27.225190 env[1686]: time="2024-04-12T18:23:27.225101638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-dp8zd,Uid:f656056c-3cdf-40e9-84b2-2d3a77291360,Namespace:kube-system,Attempt:0,}" Apr 12 18:23:27.227590 env[1686]: time="2024-04-12T18:23:27.227168634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-6q8rc,Uid:fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae,Namespace:kube-system,Attempt:0,}" Apr 12 18:23:27.228490 env[1686]: time="2024-04-12T18:23:27.228144421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c9b688b79-sqxnk,Uid:d4c29b30-48c4-46c1-a710-9d92004997a4,Namespace:calico-system,Attempt:0,}" Apr 12 18:23:28.048101 systemd[1]: Created slice kubepods-besteffort-pod5a542a1c_abc5_4d55_b62e_65acb2779493.slice. Apr 12 18:23:28.052755 env[1686]: time="2024-04-12T18:23:28.052393685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lfznj,Uid:5a542a1c-abc5-4d55-b62e-65acb2779493,Namespace:calico-system,Attempt:0,}" Apr 12 18:23:28.131182 env[1686]: time="2024-04-12T18:23:28.130837436Z" level=info msg="shim disconnected" id=6b0a3681dd43957611037d75bca3e29c95f409a48aeb228f2da6d79c9507cdce Apr 12 18:23:28.131182 env[1686]: time="2024-04-12T18:23:28.130907083Z" level=warning msg="cleaning up after shim disconnected" id=6b0a3681dd43957611037d75bca3e29c95f409a48aeb228f2da6d79c9507cdce namespace=k8s.io Apr 12 18:23:28.131182 env[1686]: time="2024-04-12T18:23:28.130930163Z" level=info msg="cleaning up dead shim" Apr 12 18:23:28.153503 env[1686]: time="2024-04-12T18:23:28.153443898Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:23:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3524 runtime=io.containerd.runc.v2\n" Apr 12 18:23:28.329091 env[1686]: time="2024-04-12T18:23:28.328942595Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:23:28.496894 env[1686]: time="2024-04-12T18:23:28.496724846Z" level=error msg="Failed to destroy network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.497858 env[1686]: time="2024-04-12T18:23:28.497791270Z" level=error msg="encountered an error cleaning up failed sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.498187 env[1686]: time="2024-04-12T18:23:28.498111962Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-6q8rc,Uid:fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.498754 kubelet[2894]: E0412 18:23:28.498707 2894 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.499690 kubelet[2894]: E0412 18:23:28.498800 2894 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-6q8rc" Apr 12 18:23:28.499690 kubelet[2894]: E0412 18:23:28.498842 2894 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-6q8rc" Apr 12 18:23:28.499690 kubelet[2894]: E0412 18:23:28.498922 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-6q8rc_kube-system(fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-6q8rc_kube-system(fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-6q8rc" podUID="fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae" Apr 12 18:23:28.512136 env[1686]: time="2024-04-12T18:23:28.512062827Z" level=error msg="Failed to destroy network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.513123 env[1686]: time="2024-04-12T18:23:28.513058885Z" level=error msg="encountered an error cleaning up failed sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.513440 env[1686]: time="2024-04-12T18:23:28.513372919Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c9b688b79-sqxnk,Uid:d4c29b30-48c4-46c1-a710-9d92004997a4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.514062 kubelet[2894]: E0412 18:23:28.513967 2894 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.514198 kubelet[2894]: E0412 18:23:28.514106 2894 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c9b688b79-sqxnk" Apr 12 18:23:28.514198 kubelet[2894]: E0412 18:23:28.514181 2894 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c9b688b79-sqxnk" Apr 12 18:23:28.514435 kubelet[2894]: E0412 18:23:28.514282 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7c9b688b79-sqxnk_calico-system(d4c29b30-48c4-46c1-a710-9d92004997a4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7c9b688b79-sqxnk_calico-system(d4c29b30-48c4-46c1-a710-9d92004997a4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c9b688b79-sqxnk" podUID="d4c29b30-48c4-46c1-a710-9d92004997a4" Apr 12 18:23:28.531664 env[1686]: time="2024-04-12T18:23:28.531591004Z" level=error msg="Failed to destroy network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.532525 env[1686]: time="2024-04-12T18:23:28.532465774Z" level=error msg="encountered an error cleaning up failed sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.532794 env[1686]: time="2024-04-12T18:23:28.532728538Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lfznj,Uid:5a542a1c-abc5-4d55-b62e-65acb2779493,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.533370 kubelet[2894]: E0412 18:23:28.533310 2894 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.533511 kubelet[2894]: E0412 18:23:28.533413 2894 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lfznj" Apr 12 18:23:28.533511 kubelet[2894]: E0412 18:23:28.533477 2894 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lfznj" Apr 12 18:23:28.533664 kubelet[2894]: E0412 18:23:28.533590 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lfznj_calico-system(5a542a1c-abc5-4d55-b62e-65acb2779493)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lfznj_calico-system(5a542a1c-abc5-4d55-b62e-65acb2779493)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lfznj" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" Apr 12 18:23:28.536448 env[1686]: time="2024-04-12T18:23:28.536361753Z" level=error msg="Failed to destroy network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.537980 env[1686]: time="2024-04-12T18:23:28.537527093Z" level=error msg="encountered an error cleaning up failed sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.538294 env[1686]: time="2024-04-12T18:23:28.538242189Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-dp8zd,Uid:f656056c-3cdf-40e9-84b2-2d3a77291360,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.538801 kubelet[2894]: E0412 18:23:28.538752 2894 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:28.538927 kubelet[2894]: E0412 18:23:28.538860 2894 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-dp8zd" Apr 12 18:23:28.539015 kubelet[2894]: E0412 18:23:28.538959 2894 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-dp8zd" Apr 12 18:23:28.539123 kubelet[2894]: E0412 18:23:28.539077 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-dp8zd_kube-system(f656056c-3cdf-40e9-84b2-2d3a77291360)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-dp8zd_kube-system(f656056c-3cdf-40e9-84b2-2d3a77291360)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-dp8zd" podUID="f656056c-3cdf-40e9-84b2-2d3a77291360" Apr 12 18:23:29.026760 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11-shm.mount: Deactivated successfully. Apr 12 18:23:29.027186 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0-shm.mount: Deactivated successfully. Apr 12 18:23:29.027524 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5-shm.mount: Deactivated successfully. Apr 12 18:23:29.325578 kubelet[2894]: I0412 18:23:29.325389 2894 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:29.330662 kubelet[2894]: I0412 18:23:29.330086 2894 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:29.331368 env[1686]: time="2024-04-12T18:23:29.331316169Z" level=info msg="StopPodSandbox for \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\"" Apr 12 18:23:29.334297 env[1686]: time="2024-04-12T18:23:29.333163491Z" level=info msg="StopPodSandbox for \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\"" Apr 12 18:23:29.348996 kubelet[2894]: I0412 18:23:29.348840 2894 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:29.351374 env[1686]: time="2024-04-12T18:23:29.349797533Z" level=info msg="StopPodSandbox for \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\"" Apr 12 18:23:29.360435 kubelet[2894]: I0412 18:23:29.359181 2894 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:29.361164 env[1686]: time="2024-04-12T18:23:29.361077138Z" level=info msg="StopPodSandbox for \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\"" Apr 12 18:23:29.545232 env[1686]: time="2024-04-12T18:23:29.545130361Z" level=error msg="StopPodSandbox for \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\" failed" error="failed to destroy network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:29.546190 kubelet[2894]: E0412 18:23:29.545814 2894 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:29.546190 kubelet[2894]: E0412 18:23:29.545977 2894 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0"} Apr 12 18:23:29.546190 kubelet[2894]: E0412 18:23:29.546066 2894 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:23:29.546190 kubelet[2894]: E0412 18:23:29.546149 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-6q8rc" podUID="fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae" Apr 12 18:23:29.554080 env[1686]: time="2024-04-12T18:23:29.554002467Z" level=error msg="StopPodSandbox for \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\" failed" error="failed to destroy network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:29.554707 kubelet[2894]: E0412 18:23:29.554650 2894 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:29.554855 kubelet[2894]: E0412 18:23:29.554722 2894 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0"} Apr 12 18:23:29.554855 kubelet[2894]: E0412 18:23:29.554793 2894 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5a542a1c-abc5-4d55-b62e-65acb2779493\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:23:29.554855 kubelet[2894]: E0412 18:23:29.554848 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5a542a1c-abc5-4d55-b62e-65acb2779493\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lfznj" podUID="5a542a1c-abc5-4d55-b62e-65acb2779493" Apr 12 18:23:29.555449 env[1686]: time="2024-04-12T18:23:29.555368351Z" level=error msg="StopPodSandbox for \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\" failed" error="failed to destroy network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:29.556283 kubelet[2894]: E0412 18:23:29.555916 2894 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:29.556283 kubelet[2894]: E0412 18:23:29.556000 2894 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11"} Apr 12 18:23:29.556283 kubelet[2894]: E0412 18:23:29.556088 2894 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d4c29b30-48c4-46c1-a710-9d92004997a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:23:29.556283 kubelet[2894]: E0412 18:23:29.556240 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d4c29b30-48c4-46c1-a710-9d92004997a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c9b688b79-sqxnk" podUID="d4c29b30-48c4-46c1-a710-9d92004997a4" Apr 12 18:23:29.564135 env[1686]: time="2024-04-12T18:23:29.564059813Z" level=error msg="StopPodSandbox for \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\" failed" error="failed to destroy network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:29.564767 kubelet[2894]: E0412 18:23:29.564706 2894 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:29.564920 kubelet[2894]: E0412 18:23:29.564782 2894 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5"} Apr 12 18:23:29.564998 kubelet[2894]: E0412 18:23:29.564918 2894 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f656056c-3cdf-40e9-84b2-2d3a77291360\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:23:29.564998 kubelet[2894]: E0412 18:23:29.564972 2894 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f656056c-3cdf-40e9-84b2-2d3a77291360\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-dp8zd" podUID="f656056c-3cdf-40e9-84b2-2d3a77291360" Apr 12 18:23:36.806134 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3294522916.mount: Deactivated successfully. Apr 12 18:23:36.913498 env[1686]: time="2024-04-12T18:23:36.913438564Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:36.916120 env[1686]: time="2024-04-12T18:23:36.916070528Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:36.918799 env[1686]: time="2024-04-12T18:23:36.918737546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:36.921536 env[1686]: time="2024-04-12T18:23:36.921485408Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:36.922699 env[1686]: time="2024-04-12T18:23:36.922654956Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:23:36.951672 env[1686]: time="2024-04-12T18:23:36.951597193Z" level=info msg="CreateContainer within sandbox \"61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:23:36.974883 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2178570228.mount: Deactivated successfully. Apr 12 18:23:36.993180 env[1686]: time="2024-04-12T18:23:36.993071105Z" level=info msg="CreateContainer within sandbox \"61893fa3686601d478c97804f3055efc8f8460df06dde2404181dc9b3e40d3e5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7368bd3699f703a9f02e970a2611cdeea0ce0c400aeb519d687a3473c4e4e631\"" Apr 12 18:23:36.995149 env[1686]: time="2024-04-12T18:23:36.994698941Z" level=info msg="StartContainer for \"7368bd3699f703a9f02e970a2611cdeea0ce0c400aeb519d687a3473c4e4e631\"" Apr 12 18:23:37.031091 systemd[1]: Started cri-containerd-7368bd3699f703a9f02e970a2611cdeea0ce0c400aeb519d687a3473c4e4e631.scope. Apr 12 18:23:37.075000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.075000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3326 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:37.095949 kernel: audit: type=1400 audit(1712946217.075:1165): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.096088 kernel: audit: type=1300 audit(1712946217.075:1165): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3326 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:37.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363862643336393966373033613966303265393730613236313163 Apr 12 18:23:37.107161 kernel: audit: type=1327 audit(1712946217.075:1165): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363862643336393966373033613966303265393730613236313163 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.123485 kernel: audit: type=1400 audit(1712946217.083:1166): avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.123643 kernel: audit: type=1400 audit(1712946217.083:1166): avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.131392 kernel: audit: type=1400 audit(1712946217.083:1166): avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.139504 kernel: audit: type=1400 audit(1712946217.083:1166): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.150059 kernel: audit: type=1400 audit(1712946217.083:1166): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.158161 kernel: audit: type=1400 audit(1712946217.083:1166): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.165973 kernel: audit: type=1400 audit(1712946217.083:1166): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.083000 audit: BPF prog-id=145 op=LOAD Apr 12 18:23:37.083000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3326 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:37.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363862643336393966373033613966303265393730613236313163 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-11 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3326 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:37.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363862643336393966373033613966303265393730613236313163 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit: BPF prog-id=146 op=LOAD Apr 12 18:23:37.095000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3326 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:37.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363862643336393966373033613966303265393730613236313163 Apr 12 18:23:37.095000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:23:37.095000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:37.095000 audit: BPF prog-id=147 op=LOAD Apr 12 18:23:37.095000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3326 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:37.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363862643336393966373033613966303265393730613236313163 Apr 12 18:23:37.181651 env[1686]: time="2024-04-12T18:23:37.181585269Z" level=info msg="StartContainer for \"7368bd3699f703a9f02e970a2611cdeea0ce0c400aeb519d687a3473c4e4e631\" returns successfully" Apr 12 18:23:37.310815 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:23:37.310966 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:23:37.411417 kubelet[2894]: I0412 18:23:37.411270 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4c6md" podStartSLOduration=1.6968678000000001 podStartE2EDuration="21.411181488s" podCreationTimestamp="2024-04-12 18:23:16 +0000 UTC" firstStartedPulling="2024-04-12 18:23:17.208815752 +0000 UTC m=+19.499459937" lastFinishedPulling="2024-04-12 18:23:36.923129452 +0000 UTC m=+39.213773625" observedRunningTime="2024-04-12 18:23:37.405900197 +0000 UTC m=+39.696544406" watchObservedRunningTime="2024-04-12 18:23:37.411181488 +0000 UTC m=+39.701825697" Apr 12 18:23:38.985000 audit[3854]: AVC avc: denied { write } for pid=3854 comm="tee" name="fd" dev="proc" ino=20545 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:38.999000 audit[3857]: AVC avc: denied { write } for pid=3857 comm="tee" name="fd" dev="proc" ino=20554 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:38.985000 audit[3854]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc26fe98b a2=241 a3=1b6 items=1 ppid=3823 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:38.985000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:23:38.985000 audit: PATH item=0 name="/dev/fd/63" inode=20539 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:38.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:39.019000 audit[3865]: AVC avc: denied { write } for pid=3865 comm="tee" name="fd" dev="proc" ino=20560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:38.999000 audit[3857]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe0b2197b a2=241 a3=1b6 items=1 ppid=3819 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:38.999000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:23:38.999000 audit: PATH item=0 name="/dev/fd/63" inode=19266 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:38.999000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:39.019000 audit[3865]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd023e98c a2=241 a3=1b6 items=1 ppid=3820 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.019000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:23:39.019000 audit: PATH item=0 name="/dev/fd/63" inode=19270 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:39.019000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:39.054000 audit[3869]: AVC avc: denied { write } for pid=3869 comm="tee" name="fd" dev="proc" ino=20570 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:39.054000 audit[3869]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd1bf998d a2=241 a3=1b6 items=1 ppid=3817 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.054000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:23:39.054000 audit: PATH item=0 name="/dev/fd/63" inode=20563 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:39.054000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:39.059000 audit[3871]: AVC avc: denied { write } for pid=3871 comm="tee" name="fd" dev="proc" ino=20574 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:39.062000 audit[3880]: AVC avc: denied { write } for pid=3880 comm="tee" name="fd" dev="proc" ino=20577 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:39.064000 audit[3886]: AVC avc: denied { write } for pid=3886 comm="tee" name="fd" dev="proc" ino=20580 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:39.059000 audit[3871]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffedbdd97c a2=241 a3=1b6 items=1 ppid=3824 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.059000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:23:39.059000 audit: PATH item=0 name="/dev/fd/63" inode=20567 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:39.059000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:39.064000 audit[3886]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcc3eb98b a2=241 a3=1b6 items=1 ppid=3815 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.064000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:23:39.064000 audit: PATH item=0 name="/dev/fd/63" inode=19275 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:39.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:39.062000 audit[3880]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc444498b a2=241 a3=1b6 items=1 ppid=3828 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.062000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:23:39.062000 audit: PATH item=0 name="/dev/fd/63" inode=19273 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:39.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:39.688479 kubelet[2894]: I0412 18:23:39.688438 2894 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:23:39.744000 audit[3899]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:39.744000 audit[3899]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffea60ca70 a2=0 a3=1 items=0 ppid=3027 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:39.746000 audit[3899]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:39.746000 audit[3899]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffea60ca70 a2=0 a3=1 items=0 ppid=3027 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:40.915314 (udev-worker)[3984]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917236 (udev-worker)[3985]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.917000 audit: BPF prog-id=148 op=LOAD Apr 12 18:23:40.917000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7d7f6a8 a2=70 a3=ffffc7d7f718 items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.917000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.919000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit: BPF prog-id=149 op=LOAD Apr 12 18:23:40.920000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7d7f6a8 a2=70 a3=4b243c items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.920000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.920000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc7d7f660 a2=70 a3=ffffc7d7f6d0 items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.920000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.920000 audit: BPF prog-id=150 op=LOAD Apr 12 18:23:40.920000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc7d7f648 a2=70 a3=ffffc7d7f6b8 items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.920000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.921000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:23:40.921000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.921000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7d7f718 a2=70 a3=0 items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.921000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.921000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7d7f708 a2=70 a3=0 items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.921000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.921000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7d7f678 a2=70 a3=0 items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.922000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.922000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc7d7f750 a2=70 a3=3bb5898f items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc7d7f750 a2=70 a3=3bb5898f items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.924000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.924000 audit: BPF prog-id=151 op=LOAD Apr 12 18:23:40.924000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7d7f678 a2=70 a3=3bb589a9 items=0 ppid=3921 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.924000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:40.935000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.935000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff362de58 a2=70 a3=fffff362dec8 items=0 ppid=3921 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.935000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:23:40.935000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:40.935000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff362dd28 a2=70 a3=fffff362dd98 items=0 ppid=3921 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:40.935000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:23:40.950000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:23:41.028400 env[1686]: time="2024-04-12T18:23:41.026445925Z" level=info msg="StopPodSandbox for \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\"" Apr 12 18:23:41.145000 audit[4033]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=4033 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:41.145000 audit[4033]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe260e7d0 a2=0 a3=ffffaec3dfa8 items=0 ppid=3921 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.145000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:41.154000 audit[4035]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=4035 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:41.154000 audit[4035]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffc2ed8f80 a2=0 a3=ffff9e847fa8 items=0 ppid=3921 pid=4035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.154000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:41.163000 audit[4043]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=4043 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:41.163000 audit[4043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffffbc141e0 a2=0 a3=ffffa62a6fa8 items=0 ppid=3921 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.163000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:41.169000 audit[4037]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=4037 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:41.169000 audit[4037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffcf3a3500 a2=0 a3=ffff8893ffa8 items=0 ppid=3921 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.169000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.130 [INFO][4023] k8s.go 585: Cleaning up netns ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.130 [INFO][4023] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" iface="eth0" netns="/var/run/netns/cni-680d9a16-4c7d-2eee-de3c-dd3b2f1ad3cd" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.130 [INFO][4023] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" iface="eth0" netns="/var/run/netns/cni-680d9a16-4c7d-2eee-de3c-dd3b2f1ad3cd" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.131 [INFO][4023] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" iface="eth0" netns="/var/run/netns/cni-680d9a16-4c7d-2eee-de3c-dd3b2f1ad3cd" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.131 [INFO][4023] k8s.go 592: Releasing IP address(es) ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.131 [INFO][4023] utils.go 188: Calico CNI releasing IP address ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.221 [INFO][4038] ipam_plugin.go 415: Releasing address using handleID ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.222 [INFO][4038] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.222 [INFO][4038] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.235 [WARNING][4038] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.236 [INFO][4038] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.238 [INFO][4038] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:41.247018 env[1686]: 2024-04-12 18:23:41.242 [INFO][4023] k8s.go 598: Teardown processing complete. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:41.250941 systemd[1]: run-netns-cni\x2d680d9a16\x2d4c7d\x2d2eee\x2dde3c\x2ddd3b2f1ad3cd.mount: Deactivated successfully. Apr 12 18:23:41.252919 env[1686]: time="2024-04-12T18:23:41.251978335Z" level=info msg="TearDown network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\" successfully" Apr 12 18:23:41.252919 env[1686]: time="2024-04-12T18:23:41.252042711Z" level=info msg="StopPodSandbox for \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\" returns successfully" Apr 12 18:23:41.258839 env[1686]: time="2024-04-12T18:23:41.258116529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lfznj,Uid:5a542a1c-abc5-4d55-b62e-65acb2779493,Namespace:calico-system,Attempt:1,}" Apr 12 18:23:41.617686 systemd-networkd[1493]: cali2eb7d8705c4: Link UP Apr 12 18:23:41.622990 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2eb7d8705c4: link becomes ready Apr 12 18:23:41.621674 systemd-networkd[1493]: cali2eb7d8705c4: Gained carrier Apr 12 18:23:41.621728 (udev-worker)[3983]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.448 [INFO][4049] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0 csi-node-driver- calico-system 5a542a1c-abc5-4d55-b62e-65acb2779493 703 0 2024-04-12 18:23:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-28-18 csi-node-driver-lfznj eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali2eb7d8705c4 [] []}} ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Namespace="calico-system" Pod="csi-node-driver-lfznj" WorkloadEndpoint="ip--172--31--28--18-k8s-csi--node--driver--lfznj-" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.449 [INFO][4049] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Namespace="calico-system" Pod="csi-node-driver-lfznj" WorkloadEndpoint="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.522 [INFO][4061] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" HandleID="k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.545 [INFO][4061] ipam_plugin.go 268: Auto assigning IP ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" HandleID="k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002860d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-18", "pod":"csi-node-driver-lfznj", "timestamp":"2024-04-12 18:23:41.522480742 +0000 UTC"}, Hostname:"ip-172-31-28-18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.545 [INFO][4061] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.545 [INFO][4061] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.546 [INFO][4061] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-18' Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.548 [INFO][4061] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.556 [INFO][4061] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.563 [INFO][4061] ipam.go 489: Trying affinity for 192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.566 [INFO][4061] ipam.go 155: Attempting to load block cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.573 [INFO][4061] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.574 [INFO][4061] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.578 [INFO][4061] ipam.go 1682: Creating new handle: k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4 Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.585 [INFO][4061] ipam.go 1203: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.604 [INFO][4061] ipam.go 1216: Successfully claimed IPs: [192.168.95.193/26] block=192.168.95.192/26 handle="k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.604 [INFO][4061] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.95.193/26] handle="k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" host="ip-172-31-28-18" Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.605 [INFO][4061] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:41.656493 env[1686]: 2024-04-12 18:23:41.605 [INFO][4061] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.95.193/26] IPv6=[] ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" HandleID="k8s-pod-network.a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.657881 env[1686]: 2024-04-12 18:23:41.613 [INFO][4049] k8s.go 385: Populated endpoint ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Namespace="calico-system" Pod="csi-node-driver-lfznj" WorkloadEndpoint="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5a542a1c-abc5-4d55-b62e-65acb2779493", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"", Pod:"csi-node-driver-lfznj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.95.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2eb7d8705c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:41.657881 env[1686]: 2024-04-12 18:23:41.613 [INFO][4049] k8s.go 386: Calico CNI using IPs: [192.168.95.193/32] ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Namespace="calico-system" Pod="csi-node-driver-lfznj" WorkloadEndpoint="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.657881 env[1686]: 2024-04-12 18:23:41.613 [INFO][4049] dataplane_linux.go 68: Setting the host side veth name to cali2eb7d8705c4 ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Namespace="calico-system" Pod="csi-node-driver-lfznj" WorkloadEndpoint="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.657881 env[1686]: 2024-04-12 18:23:41.622 [INFO][4049] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Namespace="calico-system" Pod="csi-node-driver-lfznj" WorkloadEndpoint="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.657881 env[1686]: 2024-04-12 18:23:41.625 [INFO][4049] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Namespace="calico-system" Pod="csi-node-driver-lfznj" WorkloadEndpoint="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5a542a1c-abc5-4d55-b62e-65acb2779493", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4", Pod:"csi-node-driver-lfznj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.95.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2eb7d8705c4", MAC:"9a:0f:f3:97:8f:5e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:41.657881 env[1686]: 2024-04-12 18:23:41.650 [INFO][4049] k8s.go 498: Wrote updated endpoint to datastore ContainerID="a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4" Namespace="calico-system" Pod="csi-node-driver-lfznj" WorkloadEndpoint="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:41.689080 env[1686]: time="2024-04-12T18:23:41.688936656Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:41.689375 env[1686]: time="2024-04-12T18:23:41.689036506Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:41.689375 env[1686]: time="2024-04-12T18:23:41.689064279Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:41.689573 env[1686]: time="2024-04-12T18:23:41.689420814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4 pid=4087 runtime=io.containerd.runc.v2 Apr 12 18:23:41.713887 systemd-networkd[1493]: vxlan.calico: Link UP Apr 12 18:23:41.713907 systemd-networkd[1493]: vxlan.calico: Gained carrier Apr 12 18:23:41.768400 systemd[1]: Started cri-containerd-a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4.scope. Apr 12 18:23:41.798000 audit[4114]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4114 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:41.798000 audit[4114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffe94b81d0 a2=0 a3=ffff9cd73fa8 items=0 ppid=3921 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.798000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.818000 audit: BPF prog-id=152 op=LOAD Apr 12 18:23:41.818000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.818000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4087 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333166333235363539336162653766396465333965366435666661 Apr 12 18:23:41.818000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.818000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4087 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333166333235363539336162653766396465333965366435666661 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit: BPF prog-id=153 op=LOAD Apr 12 18:23:41.819000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4087 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333166333235363539336162653766396465333965366435666661 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit: BPF prog-id=154 op=LOAD Apr 12 18:23:41.819000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4087 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333166333235363539336162653766396465333965366435666661 Apr 12 18:23:41.819000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:23:41.819000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:41.819000 audit: BPF prog-id=155 op=LOAD Apr 12 18:23:41.819000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4087 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:41.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333166333235363539336162653766396465333965366435666661 Apr 12 18:23:41.871584 env[1686]: time="2024-04-12T18:23:41.871422951Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lfznj,Uid:5a542a1c-abc5-4d55-b62e-65acb2779493,Namespace:calico-system,Attempt:1,} returns sandbox id \"a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4\"" Apr 12 18:23:41.877877 env[1686]: time="2024-04-12T18:23:41.877823253Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:23:43.027248 env[1686]: time="2024-04-12T18:23:43.027116141Z" level=info msg="StopPodSandbox for \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\"" Apr 12 18:23:43.027860 env[1686]: time="2024-04-12T18:23:43.027811321Z" level=info msg="StopPodSandbox for \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\"" Apr 12 18:23:43.031283 env[1686]: time="2024-04-12T18:23:43.028073600Z" level=info msg="StopPodSandbox for \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\"" Apr 12 18:23:43.056072 systemd-networkd[1493]: vxlan.calico: Gained IPv6LL Apr 12 18:23:43.376521 systemd-networkd[1493]: cali2eb7d8705c4: Gained IPv6LL Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.239 [INFO][4168] k8s.go 585: Cleaning up netns ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.239 [INFO][4168] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" iface="eth0" netns="/var/run/netns/cni-1f7cc495-7a14-1197-8dca-edf38d26eccd" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.239 [INFO][4168] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" iface="eth0" netns="/var/run/netns/cni-1f7cc495-7a14-1197-8dca-edf38d26eccd" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.240 [INFO][4168] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" iface="eth0" netns="/var/run/netns/cni-1f7cc495-7a14-1197-8dca-edf38d26eccd" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.240 [INFO][4168] k8s.go 592: Releasing IP address(es) ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.240 [INFO][4168] utils.go 188: Calico CNI releasing IP address ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.348 [INFO][4193] ipam_plugin.go 415: Releasing address using handleID ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.351 [INFO][4193] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.354 [INFO][4193] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.370 [WARNING][4193] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.370 [INFO][4193] ipam_plugin.go 443: Releasing address using workloadID ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.373 [INFO][4193] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:43.381094 env[1686]: 2024-04-12 18:23:43.377 [INFO][4168] k8s.go 598: Teardown processing complete. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:43.391178 systemd[1]: run-netns-cni\x2d1f7cc495\x2d7a14\x2d1197\x2d8dca\x2dedf38d26eccd.mount: Deactivated successfully. Apr 12 18:23:43.393168 env[1686]: time="2024-04-12T18:23:43.393110732Z" level=info msg="TearDown network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\" successfully" Apr 12 18:23:43.393374 env[1686]: time="2024-04-12T18:23:43.393339672Z" level=info msg="StopPodSandbox for \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\" returns successfully" Apr 12 18:23:43.394498 env[1686]: time="2024-04-12T18:23:43.394427863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c9b688b79-sqxnk,Uid:d4c29b30-48c4-46c1-a710-9d92004997a4,Namespace:calico-system,Attempt:1,}" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.262 [INFO][4178] k8s.go 585: Cleaning up netns ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.262 [INFO][4178] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" iface="eth0" netns="/var/run/netns/cni-b5d76c16-4e64-c081-9906-f2227c02e3c8" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.262 [INFO][4178] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" iface="eth0" netns="/var/run/netns/cni-b5d76c16-4e64-c081-9906-f2227c02e3c8" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.263 [INFO][4178] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" iface="eth0" netns="/var/run/netns/cni-b5d76c16-4e64-c081-9906-f2227c02e3c8" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.263 [INFO][4178] k8s.go 592: Releasing IP address(es) ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.263 [INFO][4178] utils.go 188: Calico CNI releasing IP address ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.397 [INFO][4198] ipam_plugin.go 415: Releasing address using handleID ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.398 [INFO][4198] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.399 [INFO][4198] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.433 [WARNING][4198] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.433 [INFO][4198] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.436 [INFO][4198] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:43.461422 env[1686]: 2024-04-12 18:23:43.444 [INFO][4178] k8s.go 598: Teardown processing complete. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:43.466028 env[1686]: time="2024-04-12T18:23:43.463858479Z" level=info msg="TearDown network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\" successfully" Apr 12 18:23:43.466028 env[1686]: time="2024-04-12T18:23:43.463912406Z" level=info msg="StopPodSandbox for \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\" returns successfully" Apr 12 18:23:43.469773 systemd[1]: run-netns-cni\x2db5d76c16\x2d4e64\x2dc081\x2d9906\x2df2227c02e3c8.mount: Deactivated successfully. Apr 12 18:23:43.478080 env[1686]: time="2024-04-12T18:23:43.475203690Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-6q8rc,Uid:fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae,Namespace:kube-system,Attempt:1,}" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.297 [INFO][4179] k8s.go 585: Cleaning up netns ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.297 [INFO][4179] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" iface="eth0" netns="/var/run/netns/cni-2bfdf223-8c4f-26a4-8074-e2b4f64c488c" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.298 [INFO][4179] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" iface="eth0" netns="/var/run/netns/cni-2bfdf223-8c4f-26a4-8074-e2b4f64c488c" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.299 [INFO][4179] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" iface="eth0" netns="/var/run/netns/cni-2bfdf223-8c4f-26a4-8074-e2b4f64c488c" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.299 [INFO][4179] k8s.go 592: Releasing IP address(es) ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.299 [INFO][4179] utils.go 188: Calico CNI releasing IP address ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.458 [INFO][4202] ipam_plugin.go 415: Releasing address using handleID ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.462 [INFO][4202] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.462 [INFO][4202] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.486 [WARNING][4202] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.486 [INFO][4202] ipam_plugin.go 443: Releasing address using workloadID ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.490 [INFO][4202] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:43.512838 env[1686]: 2024-04-12 18:23:43.505 [INFO][4179] k8s.go 598: Teardown processing complete. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:43.515876 env[1686]: time="2024-04-12T18:23:43.513490449Z" level=info msg="TearDown network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\" successfully" Apr 12 18:23:43.515876 env[1686]: time="2024-04-12T18:23:43.513577296Z" level=info msg="StopPodSandbox for \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\" returns successfully" Apr 12 18:23:43.517994 env[1686]: time="2024-04-12T18:23:43.517924553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-dp8zd,Uid:f656056c-3cdf-40e9-84b2-2d3a77291360,Namespace:kube-system,Attempt:1,}" Apr 12 18:23:43.520570 systemd[1]: run-netns-cni\x2d2bfdf223\x2d8c4f\x2d26a4\x2d8074\x2de2b4f64c488c.mount: Deactivated successfully. Apr 12 18:23:43.892606 systemd-networkd[1493]: cali31cb3991c16: Link UP Apr 12 18:23:43.897245 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:23:43.897414 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali31cb3991c16: link becomes ready Apr 12 18:23:43.898775 systemd-networkd[1493]: cali31cb3991c16: Gained carrier Apr 12 18:23:43.943545 env[1686]: time="2024-04-12T18:23:43.943490178Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.606 [INFO][4210] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0 calico-kube-controllers-7c9b688b79- calico-system d4c29b30-48c4-46c1-a710-9d92004997a4 714 0 2024-04-12 18:23:16 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7c9b688b79 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-28-18 calico-kube-controllers-7c9b688b79-sqxnk eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali31cb3991c16 [] []}} ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Namespace="calico-system" Pod="calico-kube-controllers-7c9b688b79-sqxnk" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.606 [INFO][4210] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Namespace="calico-system" Pod="calico-kube-controllers-7c9b688b79-sqxnk" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.762 [INFO][4247] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" HandleID="k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.805 [INFO][4247] ipam_plugin.go 268: Auto assigning IP ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" HandleID="k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ffe60), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-18", "pod":"calico-kube-controllers-7c9b688b79-sqxnk", "timestamp":"2024-04-12 18:23:43.762512445 +0000 UTC"}, Hostname:"ip-172-31-28-18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.805 [INFO][4247] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.805 [INFO][4247] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.805 [INFO][4247] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-18' Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.814 [INFO][4247] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.822 [INFO][4247] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.829 [INFO][4247] ipam.go 489: Trying affinity for 192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.835 [INFO][4247] ipam.go 155: Attempting to load block cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.840 [INFO][4247] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.840 [INFO][4247] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.843 [INFO][4247] ipam.go 1682: Creating new handle: k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.854 [INFO][4247] ipam.go 1203: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.868 [INFO][4247] ipam.go 1216: Successfully claimed IPs: [192.168.95.194/26] block=192.168.95.192/26 handle="k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.868 [INFO][4247] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.95.194/26] handle="k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" host="ip-172-31-28-18" Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.868 [INFO][4247] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:43.946572 env[1686]: 2024-04-12 18:23:43.868 [INFO][4247] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.95.194/26] IPv6=[] ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" HandleID="k8s-pod-network.668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.947841 env[1686]: 2024-04-12 18:23:43.874 [INFO][4210] k8s.go 385: Populated endpoint ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Namespace="calico-system" Pod="calico-kube-controllers-7c9b688b79-sqxnk" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0", GenerateName:"calico-kube-controllers-7c9b688b79-", Namespace:"calico-system", SelfLink:"", UID:"d4c29b30-48c4-46c1-a710-9d92004997a4", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c9b688b79", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"", Pod:"calico-kube-controllers-7c9b688b79-sqxnk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.95.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31cb3991c16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:43.947841 env[1686]: 2024-04-12 18:23:43.874 [INFO][4210] k8s.go 386: Calico CNI using IPs: [192.168.95.194/32] ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Namespace="calico-system" Pod="calico-kube-controllers-7c9b688b79-sqxnk" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.947841 env[1686]: 2024-04-12 18:23:43.875 [INFO][4210] dataplane_linux.go 68: Setting the host side veth name to cali31cb3991c16 ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Namespace="calico-system" Pod="calico-kube-controllers-7c9b688b79-sqxnk" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.947841 env[1686]: 2024-04-12 18:23:43.900 [INFO][4210] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Namespace="calico-system" Pod="calico-kube-controllers-7c9b688b79-sqxnk" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.947841 env[1686]: 2024-04-12 18:23:43.924 [INFO][4210] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Namespace="calico-system" Pod="calico-kube-controllers-7c9b688b79-sqxnk" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0", GenerateName:"calico-kube-controllers-7c9b688b79-", Namespace:"calico-system", SelfLink:"", UID:"d4c29b30-48c4-46c1-a710-9d92004997a4", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c9b688b79", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e", Pod:"calico-kube-controllers-7c9b688b79-sqxnk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.95.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31cb3991c16", MAC:"32:60:ce:0d:e6:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:43.947841 env[1686]: 2024-04-12 18:23:43.942 [INFO][4210] k8s.go 498: Wrote updated endpoint to datastore ContainerID="668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e" Namespace="calico-system" Pod="calico-kube-controllers-7c9b688b79-sqxnk" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:43.954320 env[1686]: time="2024-04-12T18:23:43.954260959Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:43.958914 env[1686]: time="2024-04-12T18:23:43.958824067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:43.984920 systemd-networkd[1493]: cali8cdffaab7d8: Link UP Apr 12 18:23:43.989541 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8cdffaab7d8: link becomes ready Apr 12 18:23:43.989158 systemd-networkd[1493]: cali8cdffaab7d8: Gained carrier Apr 12 18:23:43.992517 env[1686]: time="2024-04-12T18:23:43.992457429Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:43.996082 env[1686]: time="2024-04-12T18:23:43.996028526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:23:44.006451 env[1686]: time="2024-04-12T18:23:44.006367445Z" level=info msg="CreateContainer within sandbox \"a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.669 [INFO][4220] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0 coredns-76f75df574- kube-system fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae 715 0 2024-04-12 18:23:10 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-28-18 coredns-76f75df574-6q8rc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8cdffaab7d8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Namespace="kube-system" Pod="coredns-76f75df574-6q8rc" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.669 [INFO][4220] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Namespace="kube-system" Pod="coredns-76f75df574-6q8rc" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.778 [INFO][4254] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" HandleID="k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.813 [INFO][4254] ipam_plugin.go 268: Auto assigning IP ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" HandleID="k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002eaa20), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-28-18", "pod":"coredns-76f75df574-6q8rc", "timestamp":"2024-04-12 18:23:43.778871025 +0000 UTC"}, Hostname:"ip-172-31-28-18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.813 [INFO][4254] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.869 [INFO][4254] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.869 [INFO][4254] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-18' Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.877 [INFO][4254] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.900 [INFO][4254] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.923 [INFO][4254] ipam.go 489: Trying affinity for 192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.926 [INFO][4254] ipam.go 155: Attempting to load block cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.931 [INFO][4254] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.931 [INFO][4254] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.935 [INFO][4254] ipam.go 1682: Creating new handle: k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4 Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.950 [INFO][4254] ipam.go 1203: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.961 [INFO][4254] ipam.go 1216: Successfully claimed IPs: [192.168.95.195/26] block=192.168.95.192/26 handle="k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.961 [INFO][4254] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.95.195/26] handle="k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" host="ip-172-31-28-18" Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.961 [INFO][4254] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:44.045519 env[1686]: 2024-04-12 18:23:43.961 [INFO][4254] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.95.195/26] IPv6=[] ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" HandleID="k8s-pod-network.dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:44.047163 env[1686]: 2024-04-12 18:23:43.965 [INFO][4220] k8s.go 385: Populated endpoint ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Namespace="kube-system" Pod="coredns-76f75df574-6q8rc" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"", Pod:"coredns-76f75df574-6q8rc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.95.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8cdffaab7d8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:44.047163 env[1686]: 2024-04-12 18:23:43.966 [INFO][4220] k8s.go 386: Calico CNI using IPs: [192.168.95.195/32] ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Namespace="kube-system" Pod="coredns-76f75df574-6q8rc" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:44.047163 env[1686]: 2024-04-12 18:23:43.966 [INFO][4220] dataplane_linux.go 68: Setting the host side veth name to cali8cdffaab7d8 ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Namespace="kube-system" Pod="coredns-76f75df574-6q8rc" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:44.047163 env[1686]: 2024-04-12 18:23:43.991 [INFO][4220] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Namespace="kube-system" Pod="coredns-76f75df574-6q8rc" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:44.047163 env[1686]: 2024-04-12 18:23:43.997 [INFO][4220] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Namespace="kube-system" Pod="coredns-76f75df574-6q8rc" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4", Pod:"coredns-76f75df574-6q8rc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.95.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8cdffaab7d8", MAC:"aa:b5:f3:f8:e8:9c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:44.047163 env[1686]: 2024-04-12 18:23:44.020 [INFO][4220] k8s.go 498: Wrote updated endpoint to datastore ContainerID="dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4" Namespace="kube-system" Pod="coredns-76f75df574-6q8rc" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:44.073002 env[1686]: time="2024-04-12T18:23:44.072928072Z" level=info msg="CreateContainer within sandbox \"a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4eb801a2c49c81050de94d960c1f33d27d2918068b8d91b834934edfc1c33a2d\"" Apr 12 18:23:44.079528 env[1686]: time="2024-04-12T18:23:44.061954883Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:44.079528 env[1686]: time="2024-04-12T18:23:44.062027262Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:44.079528 env[1686]: time="2024-04-12T18:23:44.062052468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:44.079528 env[1686]: time="2024-04-12T18:23:44.062512977Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e pid=4295 runtime=io.containerd.runc.v2 Apr 12 18:23:44.080234 env[1686]: time="2024-04-12T18:23:44.079482967Z" level=info msg="StartContainer for \"4eb801a2c49c81050de94d960c1f33d27d2918068b8d91b834934edfc1c33a2d\"" Apr 12 18:23:44.092264 systemd-networkd[1493]: cali6de086d2fb4: Link UP Apr 12 18:23:44.098502 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6de086d2fb4: link becomes ready Apr 12 18:23:44.097909 systemd-networkd[1493]: cali6de086d2fb4: Gained carrier Apr 12 18:23:44.120693 systemd[1]: Started cri-containerd-668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e.scope. Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.705 [INFO][4231] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0 coredns-76f75df574- kube-system f656056c-3cdf-40e9-84b2-2d3a77291360 716 0 2024-04-12 18:23:10 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-28-18 coredns-76f75df574-dp8zd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6de086d2fb4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Namespace="kube-system" Pod="coredns-76f75df574-dp8zd" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.706 [INFO][4231] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Namespace="kube-system" Pod="coredns-76f75df574-dp8zd" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.848 [INFO][4260] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" HandleID="k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.922 [INFO][4260] ipam_plugin.go 268: Auto assigning IP ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" HandleID="k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002636a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-28-18", "pod":"coredns-76f75df574-dp8zd", "timestamp":"2024-04-12 18:23:43.848123102 +0000 UTC"}, Hostname:"ip-172-31-28-18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.922 [INFO][4260] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.962 [INFO][4260] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.962 [INFO][4260] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-18' Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.969 [INFO][4260] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:43.990 [INFO][4260] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.013 [INFO][4260] ipam.go 489: Trying affinity for 192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.019 [INFO][4260] ipam.go 155: Attempting to load block cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.033 [INFO][4260] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.035 [INFO][4260] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.038 [INFO][4260] ipam.go 1682: Creating new handle: k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14 Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.047 [INFO][4260] ipam.go 1203: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.076 [INFO][4260] ipam.go 1216: Successfully claimed IPs: [192.168.95.196/26] block=192.168.95.192/26 handle="k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.076 [INFO][4260] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.95.196/26] handle="k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" host="ip-172-31-28-18" Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.076 [INFO][4260] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:44.141158 env[1686]: 2024-04-12 18:23:44.076 [INFO][4260] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.95.196/26] IPv6=[] ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" HandleID="k8s-pod-network.26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:44.142532 env[1686]: 2024-04-12 18:23:44.080 [INFO][4231] k8s.go 385: Populated endpoint ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Namespace="kube-system" Pod="coredns-76f75df574-dp8zd" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f656056c-3cdf-40e9-84b2-2d3a77291360", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"", Pod:"coredns-76f75df574-dp8zd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.95.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6de086d2fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:44.142532 env[1686]: 2024-04-12 18:23:44.080 [INFO][4231] k8s.go 386: Calico CNI using IPs: [192.168.95.196/32] ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Namespace="kube-system" Pod="coredns-76f75df574-dp8zd" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:44.142532 env[1686]: 2024-04-12 18:23:44.080 [INFO][4231] dataplane_linux.go 68: Setting the host side veth name to cali6de086d2fb4 ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Namespace="kube-system" Pod="coredns-76f75df574-dp8zd" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:44.142532 env[1686]: 2024-04-12 18:23:44.101 [INFO][4231] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Namespace="kube-system" Pod="coredns-76f75df574-dp8zd" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:44.142532 env[1686]: 2024-04-12 18:23:44.102 [INFO][4231] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Namespace="kube-system" Pod="coredns-76f75df574-dp8zd" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f656056c-3cdf-40e9-84b2-2d3a77291360", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14", Pod:"coredns-76f75df574-dp8zd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.95.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6de086d2fb4", MAC:"e6:32:0d:3d:e5:c0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:44.142532 env[1686]: 2024-04-12 18:23:44.135 [INFO][4231] k8s.go 498: Wrote updated endpoint to datastore ContainerID="26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14" Namespace="kube-system" Pod="coredns-76f75df574-dp8zd" WorkloadEndpoint="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:44.167156 systemd[1]: Started cri-containerd-4eb801a2c49c81050de94d960c1f33d27d2918068b8d91b834934edfc1c33a2d.scope. Apr 12 18:23:44.216600 env[1686]: time="2024-04-12T18:23:44.216464254Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:44.217062 env[1686]: time="2024-04-12T18:23:44.217001172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:44.217268 env[1686]: time="2024-04-12T18:23:44.217195837Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:44.217867 env[1686]: time="2024-04-12T18:23:44.217729996Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4 pid=4359 runtime=io.containerd.runc.v2 Apr 12 18:23:44.260205 env[1686]: time="2024-04-12T18:23:44.260054478Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:44.260775 env[1686]: time="2024-04-12T18:23:44.260706437Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:44.261484 env[1686]: time="2024-04-12T18:23:44.261405220Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:44.268738 env[1686]: time="2024-04-12T18:23:44.262103620Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14 pid=4377 runtime=io.containerd.runc.v2 Apr 12 18:23:44.294823 kernel: kauditd_printk_skb: 233 callbacks suppressed Apr 12 18:23:44.295011 kernel: audit: type=1325 audit(1712946224.272:1220): table=filter:102 family=2 entries=34 op=nft_register_chain pid=4378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:44.295074 kernel: audit: type=1300 audit(1712946224.272:1220): arch=c00000b7 syscall=211 success=yes exit=18640 a0=3 a1=fffff60f49d0 a2=0 a3=ffff88d9dfa8 items=0 ppid=3921 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.272000 audit[4378]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=4378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:44.272000 audit[4378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18640 a0=3 a1=fffff60f49d0 a2=0 a3=ffff88d9dfa8 items=0 ppid=3921 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.317949 kernel: audit: type=1327 audit(1712946224.272:1220): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:44.272000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:44.329466 systemd[1]: Started cri-containerd-dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4.scope. Apr 12 18:23:44.356756 systemd[1]: Started cri-containerd-26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14.scope. Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.463573 kernel: audit: type=1400 audit(1712946224.426:1221): avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.463737 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:23:44.463802 kernel: audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:23:44.463848 kernel: audit: type=1300 audit(1712946224.426:1221): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4087 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.463897 kernel: audit: backlog limit exceeded Apr 12 18:23:44.463938 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:23:44.463981 kernel: audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:23:44.426000 audit[4326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4087 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623830316132633439633831303530646539346439363063316633 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit: BPF prog-id=156 op=LOAD Apr 12 18:23:44.426000 audit[4326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4087 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623830316132633439633831303530646539346439363063316633 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.426000 audit: BPF prog-id=157 op=LOAD Apr 12 18:23:44.426000 audit[4326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4087 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623830316132633439633831303530646539346439363063316633 Apr 12 18:23:44.427000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:23:44.427000 audit: BPF prog-id=156 op=UNLOAD Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.427000 audit: BPF prog-id=158 op=LOAD Apr 12 18:23:44.427000 audit[4326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4087 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623830316132633439633831303530646539346439363063316633 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.435000 audit: BPF prog-id=159 op=LOAD Apr 12 18:23:44.436000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.436000 audit[4307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4295 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386336353066333634623761616334653934343665376637386230 Apr 12 18:23:44.436000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.436000 audit[4307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4295 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386336353066333634623761616334653934343665376637386230 Apr 12 18:23:44.436000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.436000 audit[4307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4295 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386336353066333634623761616334653934343665376637386230 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit: BPF prog-id=161 op=LOAD Apr 12 18:23:44.466000 audit[4307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4295 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386336353066333634623761616334653934343665376637386230 Apr 12 18:23:44.466000 audit: BPF prog-id=161 op=UNLOAD Apr 12 18:23:44.466000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.466000 audit: BPF prog-id=162 op=LOAD Apr 12 18:23:44.466000 audit[4307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4295 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386336353066333634623761616334653934343665376637386230 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.480000 audit: BPF prog-id=163 op=LOAD Apr 12 18:23:44.480000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.480000 audit[4376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4359 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653936316531643835313265643436396138653836646336633864 Apr 12 18:23:44.480000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.480000 audit[4376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4359 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653936316531643835313265643436396138653836646336633864 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.481000 audit: BPF prog-id=164 op=LOAD Apr 12 18:23:44.481000 audit[4376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4359 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653936316531643835313265643436396138653836646336633864 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit: BPF prog-id=165 op=LOAD Apr 12 18:23:44.484000 audit[4376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4359 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653936316531643835313265643436396138653836646336633864 Apr 12 18:23:44.484000 audit: BPF prog-id=165 op=UNLOAD Apr 12 18:23:44.484000 audit: BPF prog-id=164 op=UNLOAD Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.484000 audit: BPF prog-id=166 op=LOAD Apr 12 18:23:44.484000 audit[4376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4359 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653936316531643835313265643436396138653836646336633864 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.491000 audit: BPF prog-id=167 op=LOAD Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4377 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646233663861626461363932356130316435373364363337663031 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4377 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646233663861626461363932356130316435373364363337663031 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.492000 audit: BPF prog-id=168 op=LOAD Apr 12 18:23:44.492000 audit[4395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4377 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646233663861626461363932356130316435373364363337663031 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit: BPF prog-id=169 op=LOAD Apr 12 18:23:44.493000 audit[4395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4377 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646233663861626461363932356130316435373364363337663031 Apr 12 18:23:44.493000 audit: BPF prog-id=169 op=UNLOAD Apr 12 18:23:44.493000 audit: BPF prog-id=168 op=UNLOAD Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.493000 audit: BPF prog-id=170 op=LOAD Apr 12 18:23:44.493000 audit[4395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4377 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646233663861626461363932356130316435373364363337663031 Apr 12 18:23:44.534000 audit[4434]: NETFILTER_CFG table=filter:103 family=2 entries=66 op=nft_register_chain pid=4434 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:44.534000 audit[4434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=36912 a0=3 a1=fffffc2fdaf0 a2=0 a3=ffffb0af9fa8 items=0 ppid=3921 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.534000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:44.549765 env[1686]: time="2024-04-12T18:23:44.549706686Z" level=info msg="StartContainer for \"4eb801a2c49c81050de94d960c1f33d27d2918068b8d91b834934edfc1c33a2d\" returns successfully" Apr 12 18:23:44.554462 env[1686]: time="2024-04-12T18:23:44.554411363Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:23:44.613638 env[1686]: time="2024-04-12T18:23:44.613577370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-dp8zd,Uid:f656056c-3cdf-40e9-84b2-2d3a77291360,Namespace:kube-system,Attempt:1,} returns sandbox id \"26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14\"" Apr 12 18:23:44.620531 env[1686]: time="2024-04-12T18:23:44.620429553Z" level=info msg="CreateContainer within sandbox \"26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:23:44.644125 env[1686]: time="2024-04-12T18:23:44.644009565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-6q8rc,Uid:fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae,Namespace:kube-system,Attempt:1,} returns sandbox id \"dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4\"" Apr 12 18:23:44.662836 env[1686]: time="2024-04-12T18:23:44.657892304Z" level=info msg="CreateContainer within sandbox \"dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:23:44.690252 env[1686]: time="2024-04-12T18:23:44.684228351Z" level=info msg="CreateContainer within sandbox \"26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8e95d463536631e23c4d831e5164e2d6d91da415b55a88b1e4c232733ca36432\"" Apr 12 18:23:44.690252 env[1686]: time="2024-04-12T18:23:44.685562945Z" level=info msg="StartContainer for \"8e95d463536631e23c4d831e5164e2d6d91da415b55a88b1e4c232733ca36432\"" Apr 12 18:23:44.685921 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3133695406.mount: Deactivated successfully. Apr 12 18:23:44.698772 env[1686]: time="2024-04-12T18:23:44.692534295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c9b688b79-sqxnk,Uid:d4c29b30-48c4-46c1-a710-9d92004997a4,Namespace:calico-system,Attempt:1,} returns sandbox id \"668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e\"" Apr 12 18:23:44.703295 env[1686]: time="2024-04-12T18:23:44.698953622Z" level=info msg="CreateContainer within sandbox \"dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d2ce8d3826f0dfd40065f5491513d91fbb84fe6838a370698d368aeec005cd96\"" Apr 12 18:23:44.703295 env[1686]: time="2024-04-12T18:23:44.700500913Z" level=info msg="StartContainer for \"d2ce8d3826f0dfd40065f5491513d91fbb84fe6838a370698d368aeec005cd96\"" Apr 12 18:23:44.764460 systemd[1]: Started cri-containerd-d2ce8d3826f0dfd40065f5491513d91fbb84fe6838a370698d368aeec005cd96.scope. Apr 12 18:23:44.817052 systemd[1]: Started cri-containerd-8e95d463536631e23c4d831e5164e2d6d91da415b55a88b1e4c232733ca36432.scope. Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.827000 audit: BPF prog-id=171 op=LOAD Apr 12 18:23:44.829000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.829000 audit[4482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4359 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636538643338323666306466643430303635663534393135313364 Apr 12 18:23:44.829000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.829000 audit[4482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4359 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636538643338323666306466643430303635663534393135313364 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.830000 audit: BPF prog-id=172 op=LOAD Apr 12 18:23:44.830000 audit[4482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4359 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636538643338323666306466643430303635663534393135313364 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.831000 audit: BPF prog-id=173 op=LOAD Apr 12 18:23:44.831000 audit[4482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4359 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636538643338323666306466643430303635663534393135313364 Apr 12 18:23:44.833000 audit: BPF prog-id=173 op=UNLOAD Apr 12 18:23:44.833000 audit: BPF prog-id=172 op=UNLOAD Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.833000 audit: BPF prog-id=174 op=LOAD Apr 12 18:23:44.833000 audit[4482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4359 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636538643338323666306466643430303635663534393135313364 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.858000 audit: BPF prog-id=175 op=LOAD Apr 12 18:23:44.859000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.859000 audit[4483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=4377 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393564343633353336363331653233633464383331653531363465 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4377 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393564343633353336363331653233633464383331653531363465 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.860000 audit: BPF prog-id=176 op=LOAD Apr 12 18:23:44.860000 audit[4483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4377 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393564343633353336363331653233633464383331653531363465 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.862000 audit: BPF prog-id=177 op=LOAD Apr 12 18:23:44.862000 audit[4483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4377 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393564343633353336363331653233633464383331653531363465 Apr 12 18:23:44.863000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:23:44.863000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { perfmon } for pid=4483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit[4483]: AVC avc: denied { bpf } for pid=4483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.865000 audit: BPF prog-id=178 op=LOAD Apr 12 18:23:44.865000 audit[4483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4377 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393564343633353336363331653233633464383331653531363465 Apr 12 18:23:44.894792 env[1686]: time="2024-04-12T18:23:44.894710338Z" level=info msg="StartContainer for \"d2ce8d3826f0dfd40065f5491513d91fbb84fe6838a370698d368aeec005cd96\" returns successfully" Apr 12 18:23:44.912259 systemd-networkd[1493]: cali31cb3991c16: Gained IPv6LL Apr 12 18:23:44.919298 env[1686]: time="2024-04-12T18:23:44.919232518Z" level=info msg="StartContainer for \"8e95d463536631e23c4d831e5164e2d6d91da415b55a88b1e4c232733ca36432\" returns successfully" Apr 12 18:23:45.167543 systemd-networkd[1493]: cali6de086d2fb4: Gained IPv6LL Apr 12 18:23:45.583956 kubelet[2894]: I0412 18:23:45.583898 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-dp8zd" podStartSLOduration=35.583840362 podStartE2EDuration="35.583840362s" podCreationTimestamp="2024-04-12 18:23:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:23:45.542188545 +0000 UTC m=+47.832832742" watchObservedRunningTime="2024-04-12 18:23:45.583840362 +0000 UTC m=+47.874484571" Apr 12 18:23:45.584719 kubelet[2894]: I0412 18:23:45.584085 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-6q8rc" podStartSLOduration=35.584038519 podStartE2EDuration="35.584038519s" podCreationTimestamp="2024-04-12 18:23:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:23:45.578742282 +0000 UTC m=+47.869386479" watchObservedRunningTime="2024-04-12 18:23:45.584038519 +0000 UTC m=+47.874682740" Apr 12 18:23:45.647000 audit[4543]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=4543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:45.647000 audit[4543]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffe53ea1a0 a2=0 a3=1 items=0 ppid=3027 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:45.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:45.648000 audit[4543]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:45.648000 audit[4543]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffe53ea1a0 a2=0 a3=1 items=0 ppid=3027 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:45.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:45.661000 audit[4545]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=4545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:45.661000 audit[4545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcb437bf0 a2=0 a3=1 items=0 ppid=3027 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:45.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:45.671000 audit[4545]: NETFILTER_CFG table=nat:107 family=2 entries=47 op=nft_register_chain pid=4545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:45.671000 audit[4545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffcb437bf0 a2=0 a3=1 items=0 ppid=3027 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:45.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:45.871440 systemd-networkd[1493]: cali8cdffaab7d8: Gained IPv6LL Apr 12 18:23:46.133977 env[1686]: time="2024-04-12T18:23:46.133654570Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:46.137571 env[1686]: time="2024-04-12T18:23:46.137488649Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:46.140868 env[1686]: time="2024-04-12T18:23:46.140784532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:46.143934 env[1686]: time="2024-04-12T18:23:46.143852994Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:46.145457 env[1686]: time="2024-04-12T18:23:46.145377388Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:23:46.147892 env[1686]: time="2024-04-12T18:23:46.147811592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:23:46.154836 env[1686]: time="2024-04-12T18:23:46.154762447Z" level=info msg="CreateContainer within sandbox \"a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:23:46.185354 env[1686]: time="2024-04-12T18:23:46.185287834Z" level=info msg="CreateContainer within sandbox \"a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9897633c8c5c4a2f7a6c324574d209634a0cbfcec1d83cb15e88a05a136fe1f5\"" Apr 12 18:23:46.186514 env[1686]: time="2024-04-12T18:23:46.186450739Z" level=info msg="StartContainer for \"9897633c8c5c4a2f7a6c324574d209634a0cbfcec1d83cb15e88a05a136fe1f5\"" Apr 12 18:23:46.240041 systemd[1]: Started cri-containerd-9897633c8c5c4a2f7a6c324574d209634a0cbfcec1d83cb15e88a05a136fe1f5.scope. Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4087 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:46.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393736333363386335633461326637613663333234353734643230 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.282000 audit: BPF prog-id=179 op=LOAD Apr 12 18:23:46.282000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4087 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:46.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393736333363386335633461326637613663333234353734643230 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit: BPF prog-id=180 op=LOAD Apr 12 18:23:46.283000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4087 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:46.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393736333363386335633461326637613663333234353734643230 Apr 12 18:23:46.283000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:23:46.283000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:46.283000 audit: BPF prog-id=181 op=LOAD Apr 12 18:23:46.283000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4087 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:46.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393736333363386335633461326637613663333234353734643230 Apr 12 18:23:46.313153 env[1686]: time="2024-04-12T18:23:46.313085963Z" level=info msg="StartContainer for \"9897633c8c5c4a2f7a6c324574d209634a0cbfcec1d83cb15e88a05a136fe1f5\" returns successfully" Apr 12 18:23:46.391990 systemd[1]: run-containerd-runc-k8s.io-9897633c8c5c4a2f7a6c324574d209634a0cbfcec1d83cb15e88a05a136fe1f5-runc.Z1ozYs.mount: Deactivated successfully. Apr 12 18:23:47.298274 kubelet[2894]: I0412 18:23:47.297208 2894 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:23:47.298274 kubelet[2894]: I0412 18:23:47.297280 2894 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:23:48.709266 env[1686]: time="2024-04-12T18:23:48.709155713Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.714996 env[1686]: time="2024-04-12T18:23:48.713893127Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.718189 env[1686]: time="2024-04-12T18:23:48.718124312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.726342 env[1686]: time="2024-04-12T18:23:48.726273334Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.727976 env[1686]: time="2024-04-12T18:23:48.726801782Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 18:23:48.759043 env[1686]: time="2024-04-12T18:23:48.758955923Z" level=info msg="CreateContainer within sandbox \"668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:23:48.787543 env[1686]: time="2024-04-12T18:23:48.787477296Z" level=info msg="CreateContainer within sandbox \"668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013\"" Apr 12 18:23:48.788801 env[1686]: time="2024-04-12T18:23:48.788734356Z" level=info msg="StartContainer for \"44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013\"" Apr 12 18:23:48.796895 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1797369906.mount: Deactivated successfully. Apr 12 18:23:48.830604 systemd[1]: Started cri-containerd-44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013.scope. Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.922000 audit: BPF prog-id=182 op=LOAD Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4295 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643330366561653838346230313430613138363664353335343736 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4295 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643330366561653838346230313430613138363664353335343736 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit: BPF prog-id=183 op=LOAD Apr 12 18:23:48.923000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4295 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643330366561653838346230313430613138363664353335343736 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.923000 audit: BPF prog-id=184 op=LOAD Apr 12 18:23:48.923000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4295 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643330366561653838346230313430613138363664353335343736 Apr 12 18:23:48.924000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:23:48.924000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.924000 audit: BPF prog-id=185 op=LOAD Apr 12 18:23:48.924000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4295 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643330366561653838346230313430613138363664353335343736 Apr 12 18:23:48.971790 env[1686]: time="2024-04-12T18:23:48.971617521Z" level=info msg="StartContainer for \"44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013\" returns successfully" Apr 12 18:23:49.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.18:22-139.178.89.65:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:49.255978 systemd[1]: Started sshd@7-172.31.28.18:22-139.178.89.65:40204.service. Apr 12 18:23:49.443564 sshd[4634]: Accepted publickey for core from 139.178.89.65 port 40204 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:49.442000 audit[4634]: USER_ACCT pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.447087 kernel: kauditd_printk_skb: 457 callbacks suppressed Apr 12 18:23:49.447225 kernel: audit: type=1101 audit(1712946229.442:1347): pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.456000 audit[4634]: CRED_ACQ pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.468306 kernel: audit: type=1103 audit(1712946229.456:1348): pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.468930 sshd[4634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:49.475460 kernel: audit: type=1006 audit(1712946229.456:1349): pid=4634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Apr 12 18:23:49.456000 audit[4634]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6436210 a2=3 a3=1 items=0 ppid=1 pid=4634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.486369 kernel: audit: type=1300 audit(1712946229.456:1349): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6436210 a2=3 a3=1 items=0 ppid=1 pid=4634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.456000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:49.490874 kernel: audit: type=1327 audit(1712946229.456:1349): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:49.497535 systemd-logind[1678]: New session 8 of user core. Apr 12 18:23:49.499876 systemd[1]: Started session-8.scope. Apr 12 18:23:49.512000 audit[4634]: USER_START pid=4634 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.526000 audit[4636]: CRED_ACQ pid=4636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.538457 kernel: audit: type=1105 audit(1712946229.512:1350): pid=4634 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.538634 kernel: audit: type=1103 audit(1712946229.526:1351): pid=4636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.610000 kubelet[2894]: I0412 18:23:49.609951 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-lfznj" podStartSLOduration=29.340974915 podStartE2EDuration="33.609890822s" podCreationTimestamp="2024-04-12 18:23:16 +0000 UTC" firstStartedPulling="2024-04-12 18:23:41.877061151 +0000 UTC m=+44.167705336" lastFinishedPulling="2024-04-12 18:23:46.145977058 +0000 UTC m=+48.436621243" observedRunningTime="2024-04-12 18:23:46.592286004 +0000 UTC m=+48.882930213" watchObservedRunningTime="2024-04-12 18:23:49.609890822 +0000 UTC m=+51.900535031" Apr 12 18:23:49.908387 sshd[4634]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:49.911000 audit[4634]: USER_END pid=4634 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.927053 systemd[1]: sshd@7-172.31.28.18:22-139.178.89.65:40204.service: Deactivated successfully. Apr 12 18:23:49.928600 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:23:49.930784 kernel: audit: type=1106 audit(1712946229.911:1352): pid=4634 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.930891 kernel: audit: type=1104 audit(1712946229.911:1353): pid=4634 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.911000 audit[4634]: CRED_DISP pid=4634 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:49.929951 systemd-logind[1678]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:23:49.942710 systemd-logind[1678]: Removed session 8. Apr 12 18:23:49.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.18:22-139.178.89.65:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:49.953332 kernel: audit: type=1131 audit(1712946229.926:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.18:22-139.178.89.65:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:50.135776 systemd[1]: run-containerd-runc-k8s.io-44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013-runc.SjBmE6.mount: Deactivated successfully. Apr 12 18:23:50.245264 kubelet[2894]: I0412 18:23:50.243955 2894 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7c9b688b79-sqxnk" podStartSLOduration=30.210811861 podStartE2EDuration="34.243830437s" podCreationTimestamp="2024-04-12 18:23:16 +0000 UTC" firstStartedPulling="2024-04-12 18:23:44.695371874 +0000 UTC m=+46.986016059" lastFinishedPulling="2024-04-12 18:23:48.72839045 +0000 UTC m=+51.019034635" observedRunningTime="2024-04-12 18:23:49.617742817 +0000 UTC m=+51.908387050" watchObservedRunningTime="2024-04-12 18:23:50.243830437 +0000 UTC m=+52.534474658" Apr 12 18:23:50.738926 systemd[1]: run-containerd-runc-k8s.io-44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013-runc.1EGnet.mount: Deactivated successfully. Apr 12 18:23:53.224000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:53.224000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=4003d94360 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:23:53.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:53.225000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:53.225000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=4008ed0400 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:23:53.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:53.226000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:53.226000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=4003d943c0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:23:53.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:53.264671 systemd[1]: run-containerd-runc-k8s.io-7368bd3699f703a9f02e970a2611cdeea0ce0c400aeb519d687a3473c4e4e631-runc.tNdJNL.mount: Deactivated successfully. Apr 12 18:23:53.322000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521032 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:53.322000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=4009c2c750 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:23:53.322000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:53.325000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:53.325000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400203dfa0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:23:53.325000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:53.326000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:53.326000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=4009c2c8a0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:23:53.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:54.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.18:22-139.178.89.65:40220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:54.939869 systemd[1]: Started sshd@8-172.31.28.18:22-139.178.89.65:40220.service. Apr 12 18:23:54.943207 kernel: kauditd_printk_skb: 18 callbacks suppressed Apr 12 18:23:54.943358 kernel: audit: type=1130 audit(1712946234.939:1361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.18:22-139.178.89.65:40220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:55.058000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:55.058000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020aaab0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:23:55.082579 kernel: audit: type=1400 audit(1712946235.058:1362): avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:55.082727 kernel: audit: type=1300 audit(1712946235.058:1362): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020aaab0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:23:55.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:55.058000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:55.094357 kernel: audit: type=1327 audit(1712946235.058:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:55.058000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400155e560 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:23:55.118204 kernel: audit: type=1400 audit(1712946235.058:1363): avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:55.118369 kernel: audit: type=1300 audit(1712946235.058:1363): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400155e560 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:23:55.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:55.129506 kernel: audit: type=1327 audit(1712946235.058:1363): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:55.147000 audit[4739]: USER_ACCT pid=4739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:55.150639 sshd[4739]: Accepted publickey for core from 139.178.89.65 port 40220 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:55.160335 sshd[4739]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:55.158000 audit[4739]: CRED_ACQ pid=4739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:55.170535 kernel: audit: type=1101 audit(1712946235.147:1364): pid=4739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:55.170681 kernel: audit: type=1103 audit(1712946235.158:1365): pid=4739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:55.177674 kernel: audit: type=1006 audit(1712946235.158:1366): pid=4739 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 18:23:55.158000 audit[4739]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2721630 a2=3 a3=1 items=0 ppid=1 pid=4739 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:55.158000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:55.187142 systemd-logind[1678]: New session 9 of user core. Apr 12 18:23:55.188726 systemd[1]: Started session-9.scope. Apr 12 18:23:55.199000 audit[4739]: USER_START pid=4739 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:55.203000 audit[4741]: CRED_ACQ pid=4741 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:55.462411 sshd[4739]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:55.463000 audit[4739]: USER_END pid=4739 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:55.464000 audit[4739]: CRED_DISP pid=4739 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:55.468435 systemd[1]: sshd@8-172.31.28.18:22-139.178.89.65:40220.service: Deactivated successfully. Apr 12 18:23:55.469804 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:23:55.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.18:22-139.178.89.65:40220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:55.471206 systemd-logind[1678]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:23:55.472931 systemd-logind[1678]: Removed session 9. Apr 12 18:23:56.234000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:56.234000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400163d500 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:23:56.234000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:56.239000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:56.240000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:56.239000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400155e5e0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:23:56.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:56.240000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400163dd80 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:23:56.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:56.241000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:56.241000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400163dda0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:23:56.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:58.062474 env[1686]: time="2024-04-12T18:23:58.062339633Z" level=info msg="StopPodSandbox for \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\"" Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.130 [WARNING][4763] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4", Pod:"coredns-76f75df574-6q8rc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.95.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8cdffaab7d8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.131 [INFO][4763] k8s.go 585: Cleaning up netns ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.131 [INFO][4763] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" iface="eth0" netns="" Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.131 [INFO][4763] k8s.go 592: Releasing IP address(es) ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.131 [INFO][4763] utils.go 188: Calico CNI releasing IP address ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.168 [INFO][4771] ipam_plugin.go 415: Releasing address using handleID ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.168 [INFO][4771] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.168 [INFO][4771] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.181 [WARNING][4771] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.181 [INFO][4771] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.183 [INFO][4771] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:58.188029 env[1686]: 2024-04-12 18:23:58.185 [INFO][4763] k8s.go 598: Teardown processing complete. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:58.188972 env[1686]: time="2024-04-12T18:23:58.188091566Z" level=info msg="TearDown network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\" successfully" Apr 12 18:23:58.188972 env[1686]: time="2024-04-12T18:23:58.188138130Z" level=info msg="StopPodSandbox for \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\" returns successfully" Apr 12 18:23:58.189372 env[1686]: time="2024-04-12T18:23:58.189132684Z" level=info msg="RemovePodSandbox for \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\"" Apr 12 18:23:58.189482 env[1686]: time="2024-04-12T18:23:58.189379769Z" level=info msg="Forcibly stopping sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\"" Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.255 [WARNING][4789] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"fd8c8cb4-7a74-45a4-ae27-c8e76b3a1eae", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"dfe961e1d8512ed469a8e86dc6c8dd504b0dbf9a33f5b21da89bbb3c15fce3c4", Pod:"coredns-76f75df574-6q8rc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.95.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8cdffaab7d8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.255 [INFO][4789] k8s.go 585: Cleaning up netns ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.255 [INFO][4789] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" iface="eth0" netns="" Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.255 [INFO][4789] k8s.go 592: Releasing IP address(es) ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.255 [INFO][4789] utils.go 188: Calico CNI releasing IP address ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.295 [INFO][4795] ipam_plugin.go 415: Releasing address using handleID ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.295 [INFO][4795] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.295 [INFO][4795] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.308 [WARNING][4795] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.308 [INFO][4795] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" HandleID="k8s-pod-network.1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--6q8rc-eth0" Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.310 [INFO][4795] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:58.318037 env[1686]: 2024-04-12 18:23:58.314 [INFO][4789] k8s.go 598: Teardown processing complete. ContainerID="1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0" Apr 12 18:23:58.318037 env[1686]: time="2024-04-12T18:23:58.317937507Z" level=info msg="TearDown network for sandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\" successfully" Apr 12 18:23:58.333455 env[1686]: time="2024-04-12T18:23:58.333305008Z" level=info msg="RemovePodSandbox \"1dcd57e0502abbeddcbe5c7037747fa5824dd8e78c86a73d468ee6d799052db0\" returns successfully" Apr 12 18:23:58.335080 env[1686]: time="2024-04-12T18:23:58.335011074Z" level=info msg="StopPodSandbox for \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\"" Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.411 [WARNING][4814] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f656056c-3cdf-40e9-84b2-2d3a77291360", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14", Pod:"coredns-76f75df574-dp8zd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.95.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6de086d2fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.411 [INFO][4814] k8s.go 585: Cleaning up netns ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.411 [INFO][4814] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" iface="eth0" netns="" Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.411 [INFO][4814] k8s.go 592: Releasing IP address(es) ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.412 [INFO][4814] utils.go 188: Calico CNI releasing IP address ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.450 [INFO][4820] ipam_plugin.go 415: Releasing address using handleID ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.451 [INFO][4820] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.451 [INFO][4820] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.467 [WARNING][4820] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.467 [INFO][4820] ipam_plugin.go 443: Releasing address using workloadID ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.469 [INFO][4820] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:58.473995 env[1686]: 2024-04-12 18:23:58.471 [INFO][4814] k8s.go 598: Teardown processing complete. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:58.475024 env[1686]: time="2024-04-12T18:23:58.474041541Z" level=info msg="TearDown network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\" successfully" Apr 12 18:23:58.475024 env[1686]: time="2024-04-12T18:23:58.474088573Z" level=info msg="StopPodSandbox for \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\" returns successfully" Apr 12 18:23:58.475806 env[1686]: time="2024-04-12T18:23:58.475757193Z" level=info msg="RemovePodSandbox for \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\"" Apr 12 18:23:58.476323 env[1686]: time="2024-04-12T18:23:58.476042348Z" level=info msg="Forcibly stopping sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\"" Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.575 [WARNING][4840] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f656056c-3cdf-40e9-84b2-2d3a77291360", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"26db3f8abda6925a01d573d637f0109a2aae4f78fb7a4a4eb95f8f8542592c14", Pod:"coredns-76f75df574-dp8zd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.95.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6de086d2fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.575 [INFO][4840] k8s.go 585: Cleaning up netns ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.575 [INFO][4840] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" iface="eth0" netns="" Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.575 [INFO][4840] k8s.go 592: Releasing IP address(es) ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.575 [INFO][4840] utils.go 188: Calico CNI releasing IP address ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.642 [INFO][4847] ipam_plugin.go 415: Releasing address using handleID ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.643 [INFO][4847] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.643 [INFO][4847] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.658 [WARNING][4847] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.658 [INFO][4847] ipam_plugin.go 443: Releasing address using workloadID ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" HandleID="k8s-pod-network.162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Workload="ip--172--31--28--18-k8s-coredns--76f75df574--dp8zd-eth0" Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.663 [INFO][4847] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:58.670546 env[1686]: 2024-04-12 18:23:58.667 [INFO][4840] k8s.go 598: Teardown processing complete. ContainerID="162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5" Apr 12 18:23:58.672434 env[1686]: time="2024-04-12T18:23:58.672372192Z" level=info msg="TearDown network for sandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\" successfully" Apr 12 18:23:58.682498 env[1686]: time="2024-04-12T18:23:58.682360482Z" level=info msg="RemovePodSandbox \"162072d902ee7e45786027a958a7c053bba2535e5c31e23e8c1c5cefe304cab5\" returns successfully" Apr 12 18:23:58.687913 env[1686]: time="2024-04-12T18:23:58.687783714Z" level=info msg="StopPodSandbox for \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\"" Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.760 [WARNING][4866] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0", GenerateName:"calico-kube-controllers-7c9b688b79-", Namespace:"calico-system", SelfLink:"", UID:"d4c29b30-48c4-46c1-a710-9d92004997a4", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c9b688b79", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e", Pod:"calico-kube-controllers-7c9b688b79-sqxnk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.95.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31cb3991c16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.761 [INFO][4866] k8s.go 585: Cleaning up netns ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.761 [INFO][4866] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" iface="eth0" netns="" Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.761 [INFO][4866] k8s.go 592: Releasing IP address(es) ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.761 [INFO][4866] utils.go 188: Calico CNI releasing IP address ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.798 [INFO][4872] ipam_plugin.go 415: Releasing address using handleID ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.798 [INFO][4872] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.799 [INFO][4872] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.812 [WARNING][4872] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.812 [INFO][4872] ipam_plugin.go 443: Releasing address using workloadID ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.815 [INFO][4872] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:58.821910 env[1686]: 2024-04-12 18:23:58.819 [INFO][4866] k8s.go 598: Teardown processing complete. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:58.822903 env[1686]: time="2024-04-12T18:23:58.822853686Z" level=info msg="TearDown network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\" successfully" Apr 12 18:23:58.823044 env[1686]: time="2024-04-12T18:23:58.823011278Z" level=info msg="StopPodSandbox for \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\" returns successfully" Apr 12 18:23:58.823779 env[1686]: time="2024-04-12T18:23:58.823737079Z" level=info msg="RemovePodSandbox for \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\"" Apr 12 18:23:58.824131 env[1686]: time="2024-04-12T18:23:58.824069757Z" level=info msg="Forcibly stopping sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\"" Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.888 [WARNING][4891] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0", GenerateName:"calico-kube-controllers-7c9b688b79-", Namespace:"calico-system", SelfLink:"", UID:"d4c29b30-48c4-46c1-a710-9d92004997a4", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c9b688b79", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"668c650f364b7aac4e9446e7f78b0ce549cb95ecbb0d6bbc8998d895fdd9767e", Pod:"calico-kube-controllers-7c9b688b79-sqxnk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.95.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31cb3991c16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.888 [INFO][4891] k8s.go 585: Cleaning up netns ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.888 [INFO][4891] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" iface="eth0" netns="" Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.889 [INFO][4891] k8s.go 592: Releasing IP address(es) ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.889 [INFO][4891] utils.go 188: Calico CNI releasing IP address ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.926 [INFO][4897] ipam_plugin.go 415: Releasing address using handleID ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.927 [INFO][4897] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.927 [INFO][4897] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.939 [WARNING][4897] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.940 [INFO][4897] ipam_plugin.go 443: Releasing address using workloadID ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" HandleID="k8s-pod-network.07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Workload="ip--172--31--28--18-k8s-calico--kube--controllers--7c9b688b79--sqxnk-eth0" Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.942 [INFO][4897] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:58.947062 env[1686]: 2024-04-12 18:23:58.944 [INFO][4891] k8s.go 598: Teardown processing complete. ContainerID="07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11" Apr 12 18:23:58.948035 env[1686]: time="2024-04-12T18:23:58.947971026Z" level=info msg="TearDown network for sandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\" successfully" Apr 12 18:23:58.953363 env[1686]: time="2024-04-12T18:23:58.953302413Z" level=info msg="RemovePodSandbox \"07cf8830afb947ebe3cd8c29b645ade6ac90cbe2727ae4863689791e74c49f11\" returns successfully" Apr 12 18:23:58.954187 env[1686]: time="2024-04-12T18:23:58.954144354Z" level=info msg="StopPodSandbox for \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\"" Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.038 [WARNING][4915] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5a542a1c-abc5-4d55-b62e-65acb2779493", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4", Pod:"csi-node-driver-lfznj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.95.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2eb7d8705c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.039 [INFO][4915] k8s.go 585: Cleaning up netns ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.039 [INFO][4915] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" iface="eth0" netns="" Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.039 [INFO][4915] k8s.go 592: Releasing IP address(es) ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.039 [INFO][4915] utils.go 188: Calico CNI releasing IP address ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.078 [INFO][4922] ipam_plugin.go 415: Releasing address using handleID ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.078 [INFO][4922] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.078 [INFO][4922] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.091 [WARNING][4922] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.091 [INFO][4922] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.094 [INFO][4922] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:59.100319 env[1686]: 2024-04-12 18:23:59.097 [INFO][4915] k8s.go 598: Teardown processing complete. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:59.101815 env[1686]: time="2024-04-12T18:23:59.101750563Z" level=info msg="TearDown network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\" successfully" Apr 12 18:23:59.101972 env[1686]: time="2024-04-12T18:23:59.101936687Z" level=info msg="StopPodSandbox for \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\" returns successfully" Apr 12 18:23:59.102814 env[1686]: time="2024-04-12T18:23:59.102768817Z" level=info msg="RemovePodSandbox for \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\"" Apr 12 18:23:59.103077 env[1686]: time="2024-04-12T18:23:59.103002801Z" level=info msg="Forcibly stopping sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\"" Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.167 [WARNING][4940] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5a542a1c-abc5-4d55-b62e-65acb2779493", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"a131f3256593abe7f9de39e6d5ffa67878720ed92dcfa4799a803fa296cb4ca4", Pod:"csi-node-driver-lfznj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.95.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2eb7d8705c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.167 [INFO][4940] k8s.go 585: Cleaning up netns ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.167 [INFO][4940] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" iface="eth0" netns="" Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.167 [INFO][4940] k8s.go 592: Releasing IP address(es) ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.167 [INFO][4940] utils.go 188: Calico CNI releasing IP address ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.209 [INFO][4947] ipam_plugin.go 415: Releasing address using handleID ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.210 [INFO][4947] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.210 [INFO][4947] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.227 [WARNING][4947] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.228 [INFO][4947] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" HandleID="k8s-pod-network.3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Workload="ip--172--31--28--18-k8s-csi--node--driver--lfznj-eth0" Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.230 [INFO][4947] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:59.236509 env[1686]: 2024-04-12 18:23:59.233 [INFO][4940] k8s.go 598: Teardown processing complete. ContainerID="3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0" Apr 12 18:23:59.237854 env[1686]: time="2024-04-12T18:23:59.237344182Z" level=info msg="TearDown network for sandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\" successfully" Apr 12 18:23:59.242434 env[1686]: time="2024-04-12T18:23:59.242320678Z" level=info msg="RemovePodSandbox \"3329fd35e5a3826b8d2fce2a96b097f79b5f1a68e9cc0a37d6f84bf63d84ecb0\" returns successfully" Apr 12 18:24:00.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.18:22-139.178.89.65:35280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:00.492482 kernel: kauditd_printk_skb: 19 callbacks suppressed Apr 12 18:24:00.492536 kernel: audit: type=1130 audit(1712946240.489:1376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.18:22-139.178.89.65:35280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:00.490007 systemd[1]: Started sshd@9-172.31.28.18:22-139.178.89.65:35280.service. Apr 12 18:24:00.665000 audit[4954]: USER_ACCT pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.667025 sshd[4954]: Accepted publickey for core from 139.178.89.65 port 35280 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:00.679287 kernel: audit: type=1101 audit(1712946240.665:1377): pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.679397 kernel: audit: type=1103 audit(1712946240.677:1378): pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.677000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.680010 sshd[4954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:00.695314 kernel: audit: type=1006 audit(1712946240.677:1379): pid=4954 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:24:00.677000 audit[4954]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe06f9e70 a2=3 a3=1 items=0 ppid=1 pid=4954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:00.703936 systemd[1]: Started session-10.scope. Apr 12 18:24:00.706075 kernel: audit: type=1300 audit(1712946240.677:1379): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe06f9e70 a2=3 a3=1 items=0 ppid=1 pid=4954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:00.705511 systemd-logind[1678]: New session 10 of user core. Apr 12 18:24:00.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:00.709988 kernel: audit: type=1327 audit(1712946240.677:1379): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:00.718000 audit[4954]: USER_START pid=4954 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.732371 kernel: audit: type=1105 audit(1712946240.718:1380): pid=4954 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.731000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.749265 kernel: audit: type=1103 audit(1712946240.731:1381): pid=4956 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.985563 sshd[4954]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:00.987000 audit[4954]: USER_END pid=4954 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.002242 kernel: audit: type=1106 audit(1712946240.987:1382): pid=4954 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.002370 kernel: audit: type=1104 audit(1712946240.987:1383): pid=4954 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:00.987000 audit[4954]: CRED_DISP pid=4954 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.000390 systemd[1]: sshd@9-172.31.28.18:22-139.178.89.65:35280.service: Deactivated successfully. Apr 12 18:24:01.001711 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:24:00.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.18:22-139.178.89.65:35280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:01.010828 systemd-logind[1678]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:24:01.020361 systemd[1]: Started sshd@10-172.31.28.18:22-139.178.89.65:35282.service. Apr 12 18:24:01.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.18:22-139.178.89.65:35282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:01.022923 systemd-logind[1678]: Removed session 10. Apr 12 18:24:01.194271 sshd[4967]: Accepted publickey for core from 139.178.89.65 port 35282 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:01.192000 audit[4967]: USER_ACCT pid=4967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.196870 sshd[4967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:01.194000 audit[4967]: CRED_ACQ pid=4967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.194000 audit[4967]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc0dfc40 a2=3 a3=1 items=0 ppid=1 pid=4967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:01.194000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:01.206705 systemd-logind[1678]: New session 11 of user core. Apr 12 18:24:01.208104 systemd[1]: Started session-11.scope. Apr 12 18:24:01.217000 audit[4967]: USER_START pid=4967 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.220000 audit[4975]: CRED_ACQ pid=4975 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.543074 sshd[4967]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:01.545000 audit[4967]: USER_END pid=4967 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.545000 audit[4967]: CRED_DISP pid=4967 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.549633 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:24:01.551860 systemd-logind[1678]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:24:01.552385 systemd[1]: sshd@10-172.31.28.18:22-139.178.89.65:35282.service: Deactivated successfully. Apr 12 18:24:01.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.18:22-139.178.89.65:35282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:01.556447 systemd-logind[1678]: Removed session 11. Apr 12 18:24:01.578654 systemd[1]: Started sshd@11-172.31.28.18:22-139.178.89.65:35290.service. Apr 12 18:24:01.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.18:22-139.178.89.65:35290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:01.749000 audit[4983]: USER_ACCT pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.750701 sshd[4983]: Accepted publickey for core from 139.178.89.65 port 35290 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:01.752000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.752000 audit[4983]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff93c1590 a2=3 a3=1 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:01.752000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:01.754905 sshd[4983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:01.765939 systemd-logind[1678]: New session 12 of user core. Apr 12 18:24:01.768260 systemd[1]: Started session-12.scope. Apr 12 18:24:01.780000 audit[4983]: USER_START pid=4983 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:01.783000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:02.033906 sshd[4983]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:02.036000 audit[4983]: USER_END pid=4983 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:02.036000 audit[4983]: CRED_DISP pid=4983 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:02.039646 systemd[1]: sshd@11-172.31.28.18:22-139.178.89.65:35290.service: Deactivated successfully. Apr 12 18:24:02.040973 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:24:02.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.18:22-139.178.89.65:35290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:02.044105 systemd-logind[1678]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:24:02.046135 systemd-logind[1678]: Removed session 12. Apr 12 18:24:07.065248 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:24:07.065387 kernel: audit: type=1130 audit(1712946247.061:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.18:22-139.178.89.65:49438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:07.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.18:22-139.178.89.65:49438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:07.062634 systemd[1]: Started sshd@12-172.31.28.18:22-139.178.89.65:49438.service. Apr 12 18:24:07.236000 audit[5003]: USER_ACCT pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.238091 sshd[5003]: Accepted publickey for core from 139.178.89.65 port 49438 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:07.248000 audit[5003]: CRED_ACQ pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.250740 sshd[5003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:07.259431 kernel: audit: type=1101 audit(1712946247.236:1404): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.259569 kernel: audit: type=1103 audit(1712946247.248:1405): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.259615 kernel: audit: type=1006 audit(1712946247.248:1406): pid=5003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:24:07.248000 audit[5003]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0377070 a2=3 a3=1 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:07.276595 kernel: audit: type=1300 audit(1712946247.248:1406): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0377070 a2=3 a3=1 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:07.248000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:07.284283 systemd-logind[1678]: New session 13 of user core. Apr 12 18:24:07.286392 kernel: audit: type=1327 audit(1712946247.248:1406): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:07.285841 systemd[1]: Started session-13.scope. Apr 12 18:24:07.295000 audit[5003]: USER_START pid=5003 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.307000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.318157 kernel: audit: type=1105 audit(1712946247.295:1407): pid=5003 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.318358 kernel: audit: type=1103 audit(1712946247.307:1408): pid=5005 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.558515 sshd[5003]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:07.559000 audit[5003]: USER_END pid=5003 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.560000 audit[5003]: CRED_DISP pid=5003 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.581516 kernel: audit: type=1106 audit(1712946247.559:1409): pid=5003 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.581638 kernel: audit: type=1104 audit(1712946247.560:1410): pid=5003 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:07.572799 systemd[1]: sshd@12-172.31.28.18:22-139.178.89.65:49438.service: Deactivated successfully. Apr 12 18:24:07.574121 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:24:07.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.18:22-139.178.89.65:49438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:07.581922 systemd-logind[1678]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:24:07.583687 systemd-logind[1678]: Removed session 13. Apr 12 18:24:07.986095 systemd[1]: run-containerd-runc-k8s.io-44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013-runc.49Mli5.mount: Deactivated successfully. Apr 12 18:24:12.596509 systemd[1]: Started sshd@13-172.31.28.18:22-139.178.89.65:49444.service. Apr 12 18:24:12.607994 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:24:12.608098 kernel: audit: type=1130 audit(1712946252.595:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.18:22-139.178.89.65:49444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:12.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.18:22-139.178.89.65:49444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:12.785030 sshd[5052]: Accepted publickey for core from 139.178.89.65 port 49444 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:12.783000 audit[5052]: USER_ACCT pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:12.797245 sshd[5052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:12.795000 audit[5052]: CRED_ACQ pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:12.809461 kernel: audit: type=1101 audit(1712946252.783:1413): pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:12.809577 kernel: audit: type=1103 audit(1712946252.795:1414): pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:12.816582 kernel: audit: type=1006 audit(1712946252.795:1415): pid=5052 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:24:12.795000 audit[5052]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc16c290 a2=3 a3=1 items=0 ppid=1 pid=5052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:12.827486 kernel: audit: type=1300 audit(1712946252.795:1415): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc16c290 a2=3 a3=1 items=0 ppid=1 pid=5052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:12.795000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:12.834563 kernel: audit: type=1327 audit(1712946252.795:1415): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:12.834484 systemd-logind[1678]: New session 14 of user core. Apr 12 18:24:12.835964 systemd[1]: Started session-14.scope. Apr 12 18:24:12.845000 audit[5052]: USER_START pid=5052 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:12.857000 audit[5054]: CRED_ACQ pid=5054 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:12.868861 kernel: audit: type=1105 audit(1712946252.845:1416): pid=5052 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:12.869017 kernel: audit: type=1103 audit(1712946252.857:1417): pid=5054 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:13.102695 sshd[5052]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:13.103000 audit[5052]: USER_END pid=5052 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:13.107756 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:24:13.109023 systemd[1]: sshd@13-172.31.28.18:22-139.178.89.65:49444.service: Deactivated successfully. Apr 12 18:24:13.103000 audit[5052]: CRED_DISP pid=5052 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:13.126876 kernel: audit: type=1106 audit(1712946253.103:1418): pid=5052 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:13.127003 kernel: audit: type=1104 audit(1712946253.103:1419): pid=5052 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:13.126972 systemd-logind[1678]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:24:13.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.18:22-139.178.89.65:49444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:13.128716 systemd-logind[1678]: Removed session 14. Apr 12 18:24:18.131979 systemd[1]: Started sshd@14-172.31.28.18:22-139.178.89.65:55614.service. Apr 12 18:24:18.144089 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:24:18.144258 kernel: audit: type=1130 audit(1712946258.131:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.18:22-139.178.89.65:55614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:18.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.18:22-139.178.89.65:55614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:18.304000 audit[5063]: USER_ACCT pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.308622 sshd[5063]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:18.311930 sshd[5063]: Accepted publickey for core from 139.178.89.65 port 55614 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:18.306000 audit[5063]: CRED_ACQ pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.326899 kernel: audit: type=1101 audit(1712946258.304:1422): pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.327062 kernel: audit: type=1103 audit(1712946258.306:1423): pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.336274 systemd-logind[1678]: New session 15 of user core. Apr 12 18:24:18.338425 kernel: audit: type=1006 audit(1712946258.306:1424): pid=5063 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:24:18.339203 systemd[1]: Started session-15.scope. Apr 12 18:24:18.306000 audit[5063]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1a6d5c0 a2=3 a3=1 items=0 ppid=1 pid=5063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:18.351260 kernel: audit: type=1300 audit(1712946258.306:1424): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1a6d5c0 a2=3 a3=1 items=0 ppid=1 pid=5063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:18.366454 kernel: audit: type=1327 audit(1712946258.306:1424): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:18.366601 kernel: audit: type=1105 audit(1712946258.352:1425): pid=5063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.306000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:18.352000 audit[5063]: USER_START pid=5063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.372780 kernel: audit: type=1103 audit(1712946258.355:1426): pid=5065 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.355000 audit[5065]: CRED_ACQ pid=5065 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.623401 sshd[5063]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:18.624000 audit[5063]: USER_END pid=5063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.629605 systemd-logind[1678]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:24:18.630773 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:24:18.631966 systemd[1]: sshd@14-172.31.28.18:22-139.178.89.65:55614.service: Deactivated successfully. Apr 12 18:24:18.635428 systemd-logind[1678]: Removed session 15. Apr 12 18:24:18.624000 audit[5063]: CRED_DISP pid=5063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.647614 kernel: audit: type=1106 audit(1712946258.624:1427): pid=5063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.647811 kernel: audit: type=1104 audit(1712946258.624:1428): pid=5063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:18.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.18:22-139.178.89.65:55614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:20.137748 systemd[1]: run-containerd-runc-k8s.io-44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013-runc.Yq4LiH.mount: Deactivated successfully. Apr 12 18:24:23.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.18:22-139.178.89.65:55626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:23.651729 systemd[1]: Started sshd@15-172.31.28.18:22-139.178.89.65:55626.service. Apr 12 18:24:23.658242 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:24:23.658387 kernel: audit: type=1130 audit(1712946263.650:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.18:22-139.178.89.65:55626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:23.827000 audit[5126]: USER_ACCT pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:23.827709 sshd[5126]: Accepted publickey for core from 139.178.89.65 port 55626 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:23.839000 audit[5126]: CRED_ACQ pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:23.840422 sshd[5126]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:23.849079 kernel: audit: type=1101 audit(1712946263.827:1431): pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:23.849269 kernel: audit: type=1103 audit(1712946263.839:1432): pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:23.859588 kernel: audit: type=1006 audit(1712946263.839:1433): pid=5126 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:24:23.858472 systemd-logind[1678]: New session 16 of user core. Apr 12 18:24:23.859766 systemd[1]: Started session-16.scope. Apr 12 18:24:23.839000 audit[5126]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd4f5a30 a2=3 a3=1 items=0 ppid=1 pid=5126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:23.871875 kernel: audit: type=1300 audit(1712946263.839:1433): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd4f5a30 a2=3 a3=1 items=0 ppid=1 pid=5126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:23.839000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:23.877151 kernel: audit: type=1327 audit(1712946263.839:1433): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:23.873000 audit[5126]: USER_START pid=5126 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:23.891099 kernel: audit: type=1105 audit(1712946263.873:1434): pid=5126 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:23.878000 audit[5128]: CRED_ACQ pid=5128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:23.901676 kernel: audit: type=1103 audit(1712946263.878:1435): pid=5128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.146472 sshd[5126]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:24.148000 audit[5126]: USER_END pid=5126 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.152162 systemd-logind[1678]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:24:24.155129 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:24:24.158249 systemd-logind[1678]: Removed session 16. Apr 12 18:24:24.160007 systemd[1]: sshd@15-172.31.28.18:22-139.178.89.65:55626.service: Deactivated successfully. Apr 12 18:24:24.148000 audit[5126]: CRED_DISP pid=5126 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.171466 kernel: audit: type=1106 audit(1712946264.148:1436): pid=5126 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.171592 kernel: audit: type=1104 audit(1712946264.148:1437): pid=5126 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.18:22-139.178.89.65:55626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:24.181042 systemd[1]: Started sshd@16-172.31.28.18:22-139.178.89.65:55632.service. Apr 12 18:24:24.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.28.18:22-139.178.89.65:55632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:24.355171 sshd[5137]: Accepted publickey for core from 139.178.89.65 port 55632 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:24.354000 audit[5137]: USER_ACCT pid=5137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.357000 audit[5137]: CRED_ACQ pid=5137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.357000 audit[5137]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcea547d0 a2=3 a3=1 items=0 ppid=1 pid=5137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:24.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:24.359092 sshd[5137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:24.369377 systemd[1]: Started session-17.scope. Apr 12 18:24:24.370820 systemd-logind[1678]: New session 17 of user core. Apr 12 18:24:24.385000 audit[5137]: USER_START pid=5137 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.388000 audit[5139]: CRED_ACQ pid=5139 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.824048 sshd[5137]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:24.826000 audit[5137]: USER_END pid=5137 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.826000 audit[5137]: CRED_DISP pid=5137 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:24.829704 systemd-logind[1678]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:24:24.831038 systemd[1]: sshd@16-172.31.28.18:22-139.178.89.65:55632.service: Deactivated successfully. Apr 12 18:24:24.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.28.18:22-139.178.89.65:55632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:24.832584 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:24:24.835072 systemd-logind[1678]: Removed session 17. Apr 12 18:24:24.852869 systemd[1]: Started sshd@17-172.31.28.18:22-139.178.89.65:55636.service. Apr 12 18:24:24.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.18:22-139.178.89.65:55636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:25.027000 audit[5149]: USER_ACCT pid=5149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:25.028387 sshd[5149]: Accepted publickey for core from 139.178.89.65 port 55636 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:25.029000 audit[5149]: CRED_ACQ pid=5149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:25.030000 audit[5149]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb723890 a2=3 a3=1 items=0 ppid=1 pid=5149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:25.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:25.030931 sshd[5149]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:25.039761 systemd[1]: Started session-18.scope. Apr 12 18:24:25.040585 systemd-logind[1678]: New session 18 of user core. Apr 12 18:24:25.050000 audit[5149]: USER_START pid=5149 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:25.053000 audit[5151]: CRED_ACQ pid=5151 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.941000 audit[5162]: NETFILTER_CFG table=filter:108 family=2 entries=20 op=nft_register_rule pid=5162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:27.941000 audit[5162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd5c0c9a0 a2=0 a3=1 items=0 ppid=3027 pid=5162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:27.941000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:27.943000 audit[5162]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=5162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:27.943000 audit[5162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd5c0c9a0 a2=0 a3=1 items=0 ppid=3027 pid=5162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:27.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:27.953119 sshd[5149]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:27.954000 audit[5149]: USER_END pid=5149 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.955000 audit[5149]: CRED_DISP pid=5149 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.18:22-139.178.89.65:55636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:27.959395 systemd[1]: sshd@17-172.31.28.18:22-139.178.89.65:55636.service: Deactivated successfully. Apr 12 18:24:27.960699 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:24:27.960988 systemd[1]: session-18.scope: Consumed 1.007s CPU time. Apr 12 18:24:27.963915 systemd-logind[1678]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:24:27.966481 systemd-logind[1678]: Removed session 18. Apr 12 18:24:27.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.18:22-139.178.89.65:38138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:27.979047 systemd[1]: Started sshd@18-172.31.28.18:22-139.178.89.65:38138.service. Apr 12 18:24:28.024000 audit[5168]: NETFILTER_CFG table=filter:110 family=2 entries=32 op=nft_register_rule pid=5168 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:28.024000 audit[5168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffbf0f7f0 a2=0 a3=1 items=0 ppid=3027 pid=5168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:28.024000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:28.026000 audit[5168]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=5168 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:28.026000 audit[5168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffbf0f7f0 a2=0 a3=1 items=0 ppid=3027 pid=5168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:28.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:28.163000 audit[5166]: USER_ACCT pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.165316 sshd[5166]: Accepted publickey for core from 139.178.89.65 port 38138 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:28.165000 audit[5166]: CRED_ACQ pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.166000 audit[5166]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5ce55b0 a2=3 a3=1 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:28.166000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:28.167923 sshd[5166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:28.177023 systemd[1]: Started session-19.scope. Apr 12 18:24:28.178172 systemd-logind[1678]: New session 19 of user core. Apr 12 18:24:28.186000 audit[5166]: USER_START pid=5166 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.188000 audit[5169]: CRED_ACQ pid=5169 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.753458 sshd[5166]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:28.761849 kernel: kauditd_printk_skb: 43 callbacks suppressed Apr 12 18:24:28.761989 kernel: audit: type=1106 audit(1712946268.754:1467): pid=5166 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.754000 audit[5166]: USER_END pid=5166 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.759909 systemd[1]: sshd@18-172.31.28.18:22-139.178.89.65:38138.service: Deactivated successfully. Apr 12 18:24:28.761188 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:24:28.763746 systemd-logind[1678]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:24:28.765856 systemd-logind[1678]: Removed session 19. Apr 12 18:24:28.770410 kernel: audit: type=1104 audit(1712946268.755:1468): pid=5166 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.755000 audit[5166]: CRED_DISP pid=5166 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.18:22-139.178.89.65:38138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:28.790146 kernel: audit: type=1131 audit(1712946268.757:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.18:22-139.178.89.65:38138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:28.791289 systemd[1]: Started sshd@19-172.31.28.18:22-139.178.89.65:38148.service. Apr 12 18:24:28.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.18:22-139.178.89.65:38148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:28.807353 kernel: audit: type=1130 audit(1712946268.790:1470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.18:22-139.178.89.65:38148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:28.986000 audit[5177]: USER_ACCT pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.988391 sshd[5177]: Accepted publickey for core from 139.178.89.65 port 38148 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:28.999386 kernel: audit: type=1101 audit(1712946268.986:1471): pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:28.998000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:29.000339 sshd[5177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:29.016731 kernel: audit: type=1103 audit(1712946268.998:1472): pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:29.016876 kernel: audit: type=1006 audit(1712946268.998:1473): pid=5177 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 18:24:29.011662 systemd[1]: Started session-20.scope. Apr 12 18:24:29.013431 systemd-logind[1678]: New session 20 of user core. Apr 12 18:24:28.998000 audit[5177]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb722950 a2=3 a3=1 items=0 ppid=1 pid=5177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:29.029483 kernel: audit: type=1300 audit(1712946268.998:1473): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb722950 a2=3 a3=1 items=0 ppid=1 pid=5177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:28.998000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:29.033463 kernel: audit: type=1327 audit(1712946268.998:1473): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:29.028000 audit[5177]: USER_START pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:29.045224 kernel: audit: type=1105 audit(1712946269.028:1474): pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:29.032000 audit[5179]: CRED_ACQ pid=5179 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:29.281729 sshd[5177]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:29.283000 audit[5177]: USER_END pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:29.284000 audit[5177]: CRED_DISP pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:29.288602 systemd[1]: sshd@19-172.31.28.18:22-139.178.89.65:38148.service: Deactivated successfully. Apr 12 18:24:29.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.18:22-139.178.89.65:38148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:29.290302 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:24:29.291718 systemd-logind[1678]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:24:29.295891 systemd-logind[1678]: Removed session 20. Apr 12 18:24:34.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.18:22-139.178.89.65:38152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:34.309026 systemd[1]: Started sshd@20-172.31.28.18:22-139.178.89.65:38152.service. Apr 12 18:24:34.311432 kernel: kauditd_printk_skb: 4 callbacks suppressed Apr 12 18:24:34.311496 kernel: audit: type=1130 audit(1712946274.309:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.18:22-139.178.89.65:38152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:34.485000 audit[5194]: USER_ACCT pid=5194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.485789 sshd[5194]: Accepted publickey for core from 139.178.89.65 port 38152 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:34.497274 kernel: audit: type=1101 audit(1712946274.485:1480): pid=5194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.497000 audit[5194]: CRED_ACQ pid=5194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.498779 sshd[5194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:34.515942 kernel: audit: type=1103 audit(1712946274.497:1481): pid=5194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.516086 kernel: audit: type=1006 audit(1712946274.497:1482): pid=5194 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:24:34.516151 kernel: audit: type=1300 audit(1712946274.497:1482): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd34ab1a0 a2=3 a3=1 items=0 ppid=1 pid=5194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:34.497000 audit[5194]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd34ab1a0 a2=3 a3=1 items=0 ppid=1 pid=5194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:34.514999 systemd[1]: Started session-21.scope. Apr 12 18:24:34.517078 systemd-logind[1678]: New session 21 of user core. Apr 12 18:24:34.497000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:34.528193 kernel: audit: type=1327 audit(1712946274.497:1482): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:34.530000 audit[5194]: USER_START pid=5194 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.543301 kernel: audit: type=1105 audit(1712946274.530:1483): pid=5194 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.542000 audit[5196]: CRED_ACQ pid=5196 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.553285 kernel: audit: type=1103 audit(1712946274.542:1484): pid=5196 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.781075 sshd[5194]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:34.784000 audit[5194]: USER_END pid=5194 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.796260 kernel: audit: type=1106 audit(1712946274.784:1485): pid=5194 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.785000 audit[5194]: CRED_DISP pid=5194 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.796717 systemd[1]: sshd@20-172.31.28.18:22-139.178.89.65:38152.service: Deactivated successfully. Apr 12 18:24:34.798095 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:24:34.806903 systemd-logind[1678]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:24:34.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.18:22-139.178.89.65:38152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:34.807255 kernel: audit: type=1104 audit(1712946274.785:1486): pid=5194 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:34.809174 systemd-logind[1678]: Removed session 21. Apr 12 18:24:37.262000 audit[5206]: NETFILTER_CFG table=filter:112 family=2 entries=20 op=nft_register_rule pid=5206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:37.262000 audit[5206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe6f34140 a2=0 a3=1 items=0 ppid=3027 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:37.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:37.267000 audit[5206]: NETFILTER_CFG table=nat:113 family=2 entries=104 op=nft_register_chain pid=5206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:37.267000 audit[5206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffe6f34140 a2=0 a3=1 items=0 ppid=3027 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:37.267000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:39.810758 systemd[1]: Started sshd@21-172.31.28.18:22-139.178.89.65:41312.service. Apr 12 18:24:39.829437 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:24:39.829592 kernel: audit: type=1130 audit(1712946279.816:1490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.18:22-139.178.89.65:41312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:39.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.18:22-139.178.89.65:41312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:39.986000 audit[5209]: USER_ACCT pid=5209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:39.990147 sshd[5209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:39.998355 sshd[5209]: Accepted publickey for core from 139.178.89.65 port 41312 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:39.988000 audit[5209]: CRED_ACQ pid=5209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.005368 kernel: audit: type=1101 audit(1712946279.986:1491): pid=5209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.005732 systemd-logind[1678]: New session 22 of user core. Apr 12 18:24:40.007858 systemd[1]: Started session-22.scope. Apr 12 18:24:40.036883 kernel: audit: type=1103 audit(1712946279.988:1492): pid=5209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.037064 kernel: audit: type=1006 audit(1712946279.988:1493): pid=5209 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:24:40.045246 kernel: audit: type=1300 audit(1712946279.988:1493): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3ea8050 a2=3 a3=1 items=0 ppid=1 pid=5209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:39.988000 audit[5209]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3ea8050 a2=3 a3=1 items=0 ppid=1 pid=5209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:39.988000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:40.059561 kernel: audit: type=1327 audit(1712946279.988:1493): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:40.059673 kernel: audit: type=1105 audit(1712946280.052:1494): pid=5209 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.052000 audit[5209]: USER_START pid=5209 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.054000 audit[5211]: CRED_ACQ pid=5211 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.079961 kernel: audit: type=1103 audit(1712946280.054:1495): pid=5211 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.356966 sshd[5209]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:40.359000 audit[5209]: USER_END pid=5209 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.369874 systemd[1]: sshd@21-172.31.28.18:22-139.178.89.65:41312.service: Deactivated successfully. Apr 12 18:24:40.371165 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:24:40.373327 systemd-logind[1678]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:24:40.375146 systemd-logind[1678]: Removed session 22. Apr 12 18:24:40.360000 audit[5209]: CRED_DISP pid=5209 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.384828 kernel: audit: type=1106 audit(1712946280.359:1496): pid=5209 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.384970 kernel: audit: type=1104 audit(1712946280.360:1497): pid=5209 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:40.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.18:22-139.178.89.65:41312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:41.116057 kubelet[2894]: I0412 18:24:41.116004 2894 topology_manager.go:215] "Topology Admit Handler" podUID="36aeedb8-2b62-4951-8ec8-310f9ab0266b" podNamespace="calico-apiserver" podName="calico-apiserver-65fd8cfd59-fx4j5" Apr 12 18:24:41.129826 systemd[1]: Created slice kubepods-besteffort-pod36aeedb8_2b62_4951_8ec8_310f9ab0266b.slice. Apr 12 18:24:41.140468 kubelet[2894]: I0412 18:24:41.140416 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p9967\" (UniqueName: \"kubernetes.io/projected/36aeedb8-2b62-4951-8ec8-310f9ab0266b-kube-api-access-p9967\") pod \"calico-apiserver-65fd8cfd59-fx4j5\" (UID: \"36aeedb8-2b62-4951-8ec8-310f9ab0266b\") " pod="calico-apiserver/calico-apiserver-65fd8cfd59-fx4j5" Apr 12 18:24:41.140778 kubelet[2894]: I0412 18:24:41.140749 2894 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/36aeedb8-2b62-4951-8ec8-310f9ab0266b-calico-apiserver-certs\") pod \"calico-apiserver-65fd8cfd59-fx4j5\" (UID: \"36aeedb8-2b62-4951-8ec8-310f9ab0266b\") " pod="calico-apiserver/calico-apiserver-65fd8cfd59-fx4j5" Apr 12 18:24:41.203000 audit[5223]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:41.203000 audit[5223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe3565d90 a2=0 a3=1 items=0 ppid=3027 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:41.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:41.207000 audit[5223]: NETFILTER_CFG table=nat:115 family=2 entries=44 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:41.207000 audit[5223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffe3565d90 a2=0 a3=1 items=0 ppid=3027 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:41.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:41.223000 audit[5225]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=5225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:41.223000 audit[5225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffea7b1ed0 a2=0 a3=1 items=0 ppid=3027 pid=5225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:41.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:41.226000 audit[5225]: NETFILTER_CFG table=nat:117 family=2 entries=44 op=nft_register_rule pid=5225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:41.226000 audit[5225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffea7b1ed0 a2=0 a3=1 items=0 ppid=3027 pid=5225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:41.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:41.241753 kubelet[2894]: E0412 18:24:41.241703 2894 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:24:41.242948 kubelet[2894]: E0412 18:24:41.242906 2894 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/36aeedb8-2b62-4951-8ec8-310f9ab0266b-calico-apiserver-certs podName:36aeedb8-2b62-4951-8ec8-310f9ab0266b nodeName:}" failed. No retries permitted until 2024-04-12 18:24:41.74286053 +0000 UTC m=+104.033504715 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/36aeedb8-2b62-4951-8ec8-310f9ab0266b-calico-apiserver-certs") pod "calico-apiserver-65fd8cfd59-fx4j5" (UID: "36aeedb8-2b62-4951-8ec8-310f9ab0266b") : secret "calico-apiserver-certs" not found Apr 12 18:24:42.039896 env[1686]: time="2024-04-12T18:24:42.039366618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65fd8cfd59-fx4j5,Uid:36aeedb8-2b62-4951-8ec8-310f9ab0266b,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:24:42.316973 systemd-networkd[1493]: calie99a48411b5: Link UP Apr 12 18:24:42.323908 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:24:42.324088 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie99a48411b5: link becomes ready Apr 12 18:24:42.324291 systemd-networkd[1493]: calie99a48411b5: Gained carrier Apr 12 18:24:42.324781 (udev-worker)[5247]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.143 [INFO][5228] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0 calico-apiserver-65fd8cfd59- calico-apiserver 36aeedb8-2b62-4951-8ec8-310f9ab0266b 1102 0 2024-04-12 18:24:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65fd8cfd59 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-28-18 calico-apiserver-65fd8cfd59-fx4j5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie99a48411b5 [] []}} ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Namespace="calico-apiserver" Pod="calico-apiserver-65fd8cfd59-fx4j5" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.144 [INFO][5228] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Namespace="calico-apiserver" Pod="calico-apiserver-65fd8cfd59-fx4j5" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.208 [INFO][5240] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" HandleID="k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Workload="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.249 [INFO][5240] ipam_plugin.go 268: Auto assigning IP ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" HandleID="k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Workload="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263740), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-28-18", "pod":"calico-apiserver-65fd8cfd59-fx4j5", "timestamp":"2024-04-12 18:24:42.208802967 +0000 UTC"}, Hostname:"ip-172-31-28-18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.250 [INFO][5240] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.250 [INFO][5240] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.250 [INFO][5240] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-18' Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.256 [INFO][5240] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.271 [INFO][5240] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.280 [INFO][5240] ipam.go 489: Trying affinity for 192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.284 [INFO][5240] ipam.go 155: Attempting to load block cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.289 [INFO][5240] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.289 [INFO][5240] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.291 [INFO][5240] ipam.go 1682: Creating new handle: k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.298 [INFO][5240] ipam.go 1203: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.308 [INFO][5240] ipam.go 1216: Successfully claimed IPs: [192.168.95.197/26] block=192.168.95.192/26 handle="k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.308 [INFO][5240] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.95.197/26] handle="k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" host="ip-172-31-28-18" Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.308 [INFO][5240] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:24:42.360948 env[1686]: 2024-04-12 18:24:42.309 [INFO][5240] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.95.197/26] IPv6=[] ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" HandleID="k8s-pod-network.d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Workload="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" Apr 12 18:24:42.362192 env[1686]: 2024-04-12 18:24:42.312 [INFO][5228] k8s.go 385: Populated endpoint ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Namespace="calico-apiserver" Pod="calico-apiserver-65fd8cfd59-fx4j5" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0", GenerateName:"calico-apiserver-65fd8cfd59-", Namespace:"calico-apiserver", SelfLink:"", UID:"36aeedb8-2b62-4951-8ec8-310f9ab0266b", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 24, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65fd8cfd59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"", Pod:"calico-apiserver-65fd8cfd59-fx4j5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.95.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie99a48411b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:24:42.362192 env[1686]: 2024-04-12 18:24:42.312 [INFO][5228] k8s.go 386: Calico CNI using IPs: [192.168.95.197/32] ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Namespace="calico-apiserver" Pod="calico-apiserver-65fd8cfd59-fx4j5" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" Apr 12 18:24:42.362192 env[1686]: 2024-04-12 18:24:42.312 [INFO][5228] dataplane_linux.go 68: Setting the host side veth name to calie99a48411b5 ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Namespace="calico-apiserver" Pod="calico-apiserver-65fd8cfd59-fx4j5" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" Apr 12 18:24:42.362192 env[1686]: 2024-04-12 18:24:42.330 [INFO][5228] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Namespace="calico-apiserver" Pod="calico-apiserver-65fd8cfd59-fx4j5" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" Apr 12 18:24:42.362192 env[1686]: 2024-04-12 18:24:42.330 [INFO][5228] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Namespace="calico-apiserver" Pod="calico-apiserver-65fd8cfd59-fx4j5" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0", GenerateName:"calico-apiserver-65fd8cfd59-", Namespace:"calico-apiserver", SelfLink:"", UID:"36aeedb8-2b62-4951-8ec8-310f9ab0266b", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 24, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65fd8cfd59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-18", ContainerID:"d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f", Pod:"calico-apiserver-65fd8cfd59-fx4j5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.95.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie99a48411b5", MAC:"a6:5c:22:f0:b5:74", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:24:42.362192 env[1686]: 2024-04-12 18:24:42.356 [INFO][5228] k8s.go 498: Wrote updated endpoint to datastore ContainerID="d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f" Namespace="calico-apiserver" Pod="calico-apiserver-65fd8cfd59-fx4j5" WorkloadEndpoint="ip--172--31--28--18-k8s-calico--apiserver--65fd8cfd59--fx4j5-eth0" Apr 12 18:24:42.386842 env[1686]: time="2024-04-12T18:24:42.385404803Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:24:42.386842 env[1686]: time="2024-04-12T18:24:42.385503111Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:24:42.386842 env[1686]: time="2024-04-12T18:24:42.385530204Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:24:42.386842 env[1686]: time="2024-04-12T18:24:42.385780143Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f pid=5267 runtime=io.containerd.runc.v2 Apr 12 18:24:42.435919 systemd[1]: run-containerd-runc-k8s.io-d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f-runc.37VaMG.mount: Deactivated successfully. Apr 12 18:24:42.448502 systemd[1]: Started cri-containerd-d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f.scope. Apr 12 18:24:42.476000 audit[5300]: NETFILTER_CFG table=filter:118 family=2 entries=59 op=nft_register_chain pid=5300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:24:42.476000 audit[5300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30140 a0=3 a1=ffffdda65690 a2=0 a3=ffff9f48dfa8 items=0 ppid=3921 pid=5300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.476000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.482000 audit: BPF prog-id=186 op=LOAD Apr 12 18:24:42.484000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.484000 audit[5281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5267 pid=5281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643438643136346132396363366563653066363765663635346262 Apr 12 18:24:42.484000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.484000 audit[5281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5267 pid=5281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643438643136346132396363366563653066363765663635346262 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.485000 audit: BPF prog-id=187 op=LOAD Apr 12 18:24:42.485000 audit[5281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5267 pid=5281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643438643136346132396363366563653066363765663635346262 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.486000 audit: BPF prog-id=188 op=LOAD Apr 12 18:24:42.486000 audit[5281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5267 pid=5281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643438643136346132396363366563653066363765663635346262 Apr 12 18:24:42.487000 audit: BPF prog-id=188 op=UNLOAD Apr 12 18:24:42.488000 audit: BPF prog-id=187 op=UNLOAD Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { perfmon } for pid=5281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit[5281]: AVC avc: denied { bpf } for pid=5281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.488000 audit: BPF prog-id=189 op=LOAD Apr 12 18:24:42.488000 audit[5281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5267 pid=5281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643438643136346132396363366563653066363765663635346262 Apr 12 18:24:42.535644 env[1686]: time="2024-04-12T18:24:42.535574377Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65fd8cfd59-fx4j5,Uid:36aeedb8-2b62-4951-8ec8-310f9ab0266b,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f\"" Apr 12 18:24:42.542975 env[1686]: time="2024-04-12T18:24:42.542917052Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:24:43.599435 systemd-networkd[1493]: calie99a48411b5: Gained IPv6LL Apr 12 18:24:43.845154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3898692831.mount: Deactivated successfully. Apr 12 18:24:45.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.18:22-139.178.89.65:41328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:45.387577 systemd[1]: Started sshd@22-172.31.28.18:22-139.178.89.65:41328.service. Apr 12 18:24:45.390049 kernel: kauditd_printk_skb: 73 callbacks suppressed Apr 12 18:24:45.390174 kernel: audit: type=1130 audit(1712946285.387:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.18:22-139.178.89.65:41328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:45.572412 sshd[5314]: Accepted publickey for core from 139.178.89.65 port 41328 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:45.570000 audit[5314]: USER_ACCT pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.583876 sshd[5314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:45.582000 audit[5314]: CRED_ACQ pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.595298 kernel: audit: type=1101 audit(1712946285.570:1523): pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.595444 kernel: audit: type=1103 audit(1712946285.582:1524): pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.603004 kernel: audit: type=1006 audit(1712946285.582:1525): pid=5314 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:24:45.603146 kernel: audit: type=1300 audit(1712946285.582:1525): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff540cec0 a2=3 a3=1 items=0 ppid=1 pid=5314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:45.582000 audit[5314]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff540cec0 a2=3 a3=1 items=0 ppid=1 pid=5314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:45.602258 systemd-logind[1678]: New session 23 of user core. Apr 12 18:24:45.604385 systemd[1]: Started session-23.scope. Apr 12 18:24:45.582000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:45.617124 kernel: audit: type=1327 audit(1712946285.582:1525): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:45.624090 kernel: audit: type=1105 audit(1712946285.621:1526): pid=5314 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.621000 audit[5314]: USER_START pid=5314 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.621000 audit[5316]: CRED_ACQ pid=5316 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.643032 kernel: audit: type=1103 audit(1712946285.621:1527): pid=5316 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.904617 sshd[5314]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:45.906000 audit[5314]: USER_END pid=5314 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.911550 systemd-logind[1678]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:24:45.914058 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:24:45.916169 systemd-logind[1678]: Removed session 23. Apr 12 18:24:45.916782 systemd[1]: sshd@22-172.31.28.18:22-139.178.89.65:41328.service: Deactivated successfully. Apr 12 18:24:45.908000 audit[5314]: CRED_DISP pid=5314 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.928057 kernel: audit: type=1106 audit(1712946285.906:1528): pid=5314 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.928209 kernel: audit: type=1104 audit(1712946285.908:1529): pid=5314 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:45.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.18:22-139.178.89.65:41328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:46.280000 audit[5325]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=5325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:46.280000 audit[5325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc5e3e3d0 a2=0 a3=1 items=0 ppid=3027 pid=5325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:46.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:46.284000 audit[5325]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=5325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:46.284000 audit[5325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffc5e3e3d0 a2=0 a3=1 items=0 ppid=3027 pid=5325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:46.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:48.042948 env[1686]: time="2024-04-12T18:24:48.042876154Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:24:48.046809 env[1686]: time="2024-04-12T18:24:48.046739255Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:24:48.049899 env[1686]: time="2024-04-12T18:24:48.049826427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:24:48.052576 env[1686]: time="2024-04-12T18:24:48.052505055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:24:48.053585 env[1686]: time="2024-04-12T18:24:48.053520534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:24:48.060400 env[1686]: time="2024-04-12T18:24:48.060343592Z" level=info msg="CreateContainer within sandbox \"d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:24:48.084860 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount108220214.mount: Deactivated successfully. Apr 12 18:24:48.092637 env[1686]: time="2024-04-12T18:24:48.092536941Z" level=info msg="CreateContainer within sandbox \"d1d48d164a29cc6ece0f67ef654bbcd53616f5dc40c7450b701a97c3365dc80f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"73ccf608176845f4f68fce943eaa65987bd4191f03b1794bc502dc0ce86b6f09\"" Apr 12 18:24:48.093771 env[1686]: time="2024-04-12T18:24:48.093684385Z" level=info msg="StartContainer for \"73ccf608176845f4f68fce943eaa65987bd4191f03b1794bc502dc0ce86b6f09\"" Apr 12 18:24:48.134539 systemd[1]: Started cri-containerd-73ccf608176845f4f68fce943eaa65987bd4191f03b1794bc502dc0ce86b6f09.scope. Apr 12 18:24:48.165315 systemd[1]: run-containerd-runc-k8s.io-73ccf608176845f4f68fce943eaa65987bd4191f03b1794bc502dc0ce86b6f09-runc.iLmnI2.mount: Deactivated successfully. Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.185000 audit: BPF prog-id=190 op=LOAD Apr 12 18:24:48.186000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.186000 audit[5338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5267 pid=5338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:48.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733636366363038313736383435663466363866636539343365616136 Apr 12 18:24:48.186000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.186000 audit[5338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5267 pid=5338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:48.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733636366363038313736383435663466363866636539343365616136 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit: BPF prog-id=191 op=LOAD Apr 12 18:24:48.187000 audit[5338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5267 pid=5338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:48.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733636366363038313736383435663466363866636539343365616136 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit: BPF prog-id=192 op=LOAD Apr 12 18:24:48.187000 audit[5338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5267 pid=5338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:48.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733636366363038313736383435663466363866636539343365616136 Apr 12 18:24:48.187000 audit: BPF prog-id=192 op=UNLOAD Apr 12 18:24:48.187000 audit: BPF prog-id=191 op=UNLOAD Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { perfmon } for pid=5338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit[5338]: AVC avc: denied { bpf } for pid=5338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:48.187000 audit: BPF prog-id=193 op=LOAD Apr 12 18:24:48.187000 audit[5338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5267 pid=5338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:48.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733636366363038313736383435663466363866636539343365616136 Apr 12 18:24:48.233861 env[1686]: time="2024-04-12T18:24:48.233791793Z" level=info msg="StartContainer for \"73ccf608176845f4f68fce943eaa65987bd4191f03b1794bc502dc0ce86b6f09\" returns successfully" Apr 12 18:24:48.816000 audit[5368]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=5368 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:48.816000 audit[5368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffd59e740 a2=0 a3=1 items=0 ppid=3027 pid=5368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:48.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:48.819000 audit[5368]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=5368 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:48.819000 audit[5368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=fffffd59e740 a2=0 a3=1 items=0 ppid=3027 pid=5368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:48.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:49.901000 audit[5349]: AVC avc: denied { watch } for pid=5349 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_24_41.2710730329/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c597 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c597 tclass=file permissive=0 Apr 12 18:24:49.901000 audit[5349]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c9b680 a2=fc6 a3=0 items=0 ppid=5267 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c597 key=(null) Apr 12 18:24:49.901000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:24:50.152909 systemd[1]: run-containerd-runc-k8s.io-44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013-runc.W3bFJz.mount: Deactivated successfully. Apr 12 18:24:50.935585 systemd[1]: Started sshd@23-172.31.28.18:22-139.178.89.65:33396.service. Apr 12 18:24:50.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.28.18:22-139.178.89.65:33396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:50.938468 kernel: kauditd_printk_skb: 73 callbacks suppressed Apr 12 18:24:50.938649 kernel: audit: type=1130 audit(1712946290.935:1554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.28.18:22-139.178.89.65:33396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:51.124000 audit[5391]: USER_ACCT pid=5391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.128821 sshd[5391]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:51.131001 sshd[5391]: Accepted publickey for core from 139.178.89.65 port 33396 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:51.124000 audit[5391]: CRED_ACQ pid=5391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.146889 kernel: audit: type=1101 audit(1712946291.124:1555): pid=5391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.147053 kernel: audit: type=1103 audit(1712946291.124:1556): pid=5391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.124000 audit[5391]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe81e1900 a2=3 a3=1 items=0 ppid=1 pid=5391 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:51.168086 kernel: audit: type=1006 audit(1712946291.124:1557): pid=5391 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:24:51.168246 kernel: audit: type=1300 audit(1712946291.124:1557): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe81e1900 a2=3 a3=1 items=0 ppid=1 pid=5391 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:51.169677 systemd-logind[1678]: New session 24 of user core. Apr 12 18:24:51.171921 systemd[1]: Started session-24.scope. Apr 12 18:24:51.124000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:51.177116 kernel: audit: type=1327 audit(1712946291.124:1557): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:51.184000 audit[5391]: USER_START pid=5391 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.199948 kernel: audit: type=1105 audit(1712946291.184:1558): pid=5391 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.197000 audit[5393]: CRED_ACQ pid=5393 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.210253 kernel: audit: type=1103 audit(1712946291.197:1559): pid=5393 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.475028 sshd[5391]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:51.476000 audit[5391]: USER_END pid=5391 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.481249 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:24:51.482847 systemd[1]: sshd@23-172.31.28.18:22-139.178.89.65:33396.service: Deactivated successfully. Apr 12 18:24:51.477000 audit[5391]: CRED_DISP pid=5391 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.499143 kernel: audit: type=1106 audit(1712946291.476:1560): pid=5391 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.499291 kernel: audit: type=1104 audit(1712946291.477:1561): pid=5391 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:51.499242 systemd-logind[1678]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:24:51.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.28.18:22-139.178.89.65:33396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:51.501152 systemd-logind[1678]: Removed session 24. Apr 12 18:24:53.227000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:53.227000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=401014b340 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:24:53.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:53.227000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:53.227000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40064f0e10 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:24:53.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:53.227000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:53.227000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40064f0e40 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:24:53.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:53.322000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521032 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:53.322000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4000ef1500 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:24:53.322000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:53.326000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:53.326000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4001bc9140 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:24:53.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:53.326000 audit[2586]: AVC avc: denied { watch } for pid=2586 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:53.326000 audit[2586]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40064f12c0 a2=fc6 a3=0 items=0 ppid=2399 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c715,c1005 key=(null) Apr 12 18:24:53.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:55.060000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:55.060000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002087bc0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:55.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:55.060000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:55.060000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400163d060 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:55.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:56.235000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:56.237419 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 18:24:56.237544 kernel: audit: type=1400 audit(1712946296.235:1571): avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:56.235000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400163d380 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:56.259307 kernel: audit: type=1300 audit(1712946296.235:1571): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400163d380 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:56.259443 kernel: audit: type=1327 audit(1712946296.235:1571): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:56.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:56.240000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:56.279307 kernel: audit: type=1400 audit(1712946296.240:1572): avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:56.240000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400163d520 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:56.292191 kernel: audit: type=1300 audit(1712946296.240:1572): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400163d520 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:56.292385 kernel: audit: type=1327 audit(1712946296.240:1572): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:56.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:56.241000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:56.312053 kernel: audit: type=1400 audit(1712946296.241:1573): avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:56.312136 kernel: audit: type=1300 audit(1712946296.241:1573): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400155e9e0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:56.241000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400155e9e0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:56.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:56.334631 kernel: audit: type=1327 audit(1712946296.241:1573): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:56.334769 kernel: audit: type=1400 audit(1712946296.242:1574): avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:56.242000 audit[2558]: AVC avc: denied { watch } for pid=2558 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:56.242000 audit[2558]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400163d6e0 a2=fc6 a3=0 items=0 ppid=2437 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:24:56.242000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:56.506919 systemd[1]: Started sshd@24-172.31.28.18:22-139.178.89.65:33400.service. Apr 12 18:24:56.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.28.18:22-139.178.89.65:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:56.683000 audit[5432]: USER_ACCT pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:56.685067 sshd[5432]: Accepted publickey for core from 139.178.89.65 port 33400 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:56.685000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:56.685000 audit[5432]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde6fa740 a2=3 a3=1 items=0 ppid=1 pid=5432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:56.685000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:56.686410 sshd[5432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:56.696096 systemd[1]: Started session-25.scope. Apr 12 18:24:56.697462 systemd-logind[1678]: New session 25 of user core. Apr 12 18:24:56.712000 audit[5432]: USER_START pid=5432 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:56.715000 audit[5434]: CRED_ACQ pid=5434 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:56.960719 sshd[5432]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:56.963000 audit[5432]: USER_END pid=5432 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:56.963000 audit[5432]: CRED_DISP pid=5432 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:56.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.28.18:22-139.178.89.65:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:56.966708 systemd-logind[1678]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:24:56.967354 systemd[1]: sshd@24-172.31.28.18:22-139.178.89.65:33400.service: Deactivated successfully. Apr 12 18:24:56.968743 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:24:56.971940 systemd-logind[1678]: Removed session 25. Apr 12 18:25:01.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.28.18:22-139.178.89.65:36934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:25:01.989584 systemd[1]: Started sshd@25-172.31.28.18:22-139.178.89.65:36934.service. Apr 12 18:25:01.992118 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:25:01.992238 kernel: audit: type=1130 audit(1712946301.988:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.28.18:22-139.178.89.65:36934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:25:02.163000 audit[5453]: USER_ACCT pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.165077 sshd[5453]: Accepted publickey for core from 139.178.89.65 port 36934 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:25:02.176406 kernel: audit: type=1101 audit(1712946302.163:1585): pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.175000 audit[5453]: CRED_ACQ pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.177672 sshd[5453]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:25:02.193153 kernel: audit: type=1103 audit(1712946302.175:1586): pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.193320 kernel: audit: type=1006 audit(1712946302.175:1587): pid=5453 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:25:02.175000 audit[5453]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd965eb00 a2=3 a3=1 items=0 ppid=1 pid=5453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:02.204409 kernel: audit: type=1300 audit(1712946302.175:1587): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd965eb00 a2=3 a3=1 items=0 ppid=1 pid=5453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:02.175000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:25:02.208515 kernel: audit: type=1327 audit(1712946302.175:1587): proctitle=737368643A20636F7265205B707269765D Apr 12 18:25:02.215448 systemd[1]: Started session-26.scope. Apr 12 18:25:02.216679 systemd-logind[1678]: New session 26 of user core. Apr 12 18:25:02.225000 audit[5453]: USER_START pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.226000 audit[5455]: CRED_ACQ pid=5455 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.248069 kernel: audit: type=1105 audit(1712946302.225:1588): pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.248342 kernel: audit: type=1103 audit(1712946302.226:1589): pid=5455 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.486387 sshd[5453]: pam_unix(sshd:session): session closed for user core Apr 12 18:25:02.488000 audit[5453]: USER_END pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.493641 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:25:02.494970 systemd[1]: sshd@25-172.31.28.18:22-139.178.89.65:36934.service: Deactivated successfully. Apr 12 18:25:02.502723 systemd-logind[1678]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:25:02.503290 kernel: audit: type=1106 audit(1712946302.488:1590): pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.488000 audit[5453]: CRED_DISP pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.514006 systemd-logind[1678]: Removed session 26. Apr 12 18:25:02.515310 kernel: audit: type=1104 audit(1712946302.488:1591): pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:02.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.28.18:22-139.178.89.65:36934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:25:07.515832 systemd[1]: Started sshd@26-172.31.28.18:22-139.178.89.65:37584.service. Apr 12 18:25:07.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.28.18:22-139.178.89.65:37584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:25:07.520179 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:25:07.520413 kernel: audit: type=1130 audit(1712946307.515:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.28.18:22-139.178.89.65:37584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:25:07.705000 audit[5472]: USER_ACCT pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:07.712363 sshd[5472]: Accepted publickey for core from 139.178.89.65 port 37584 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:25:07.715406 sshd[5472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:25:07.711000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:07.726565 kernel: audit: type=1101 audit(1712946307.705:1594): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:07.726746 kernel: audit: type=1103 audit(1712946307.711:1595): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:07.711000 audit[5472]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebfb6650 a2=3 a3=1 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:07.744562 kernel: audit: type=1006 audit(1712946307.711:1596): pid=5472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 18:25:07.744706 kernel: audit: type=1300 audit(1712946307.711:1596): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebfb6650 a2=3 a3=1 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:07.711000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:25:07.748643 kernel: audit: type=1327 audit(1712946307.711:1596): proctitle=737368643A20636F7265205B707269765D Apr 12 18:25:07.752380 systemd-logind[1678]: New session 27 of user core. Apr 12 18:25:07.754435 systemd[1]: Started session-27.scope. Apr 12 18:25:07.762000 audit[5472]: USER_START pid=5472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:07.776391 kernel: audit: type=1105 audit(1712946307.762:1597): pid=5472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:07.776000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:07.787353 kernel: audit: type=1103 audit(1712946307.776:1598): pid=5474 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:07.997674 systemd[1]: run-containerd-runc-k8s.io-44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013-runc.oYWymF.mount: Deactivated successfully. Apr 12 18:25:08.053271 sshd[5472]: pam_unix(sshd:session): session closed for user core Apr 12 18:25:08.053000 audit[5472]: USER_END pid=5472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:08.062550 systemd[1]: sshd@26-172.31.28.18:22-139.178.89.65:37584.service: Deactivated successfully. Apr 12 18:25:08.063888 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:25:08.054000 audit[5472]: CRED_DISP pid=5472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:08.078865 kernel: audit: type=1106 audit(1712946308.053:1599): pid=5472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:08.079029 kernel: audit: type=1104 audit(1712946308.054:1600): pid=5472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:25:08.078923 systemd-logind[1678]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:25:08.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.28.18:22-139.178.89.65:37584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:25:08.082510 systemd-logind[1678]: Removed session 27. Apr 12 18:25:12.074095 systemd[1]: run-containerd-runc-k8s.io-73ccf608176845f4f68fce943eaa65987bd4191f03b1794bc502dc0ce86b6f09-runc.F9Ms8h.mount: Deactivated successfully. Apr 12 18:25:20.137516 systemd[1]: run-containerd-runc-k8s.io-44d306eae884b0140a1866d53547673bad1a6c13899eab4fd78ad456c4e2b013-runc.8NiVWm.mount: Deactivated successfully. Apr 12 18:25:21.548898 systemd[1]: cri-containerd-d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131.scope: Deactivated successfully. Apr 12 18:25:21.549551 systemd[1]: cri-containerd-d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131.scope: Consumed 9.615s CPU time. Apr 12 18:25:21.548000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:25:21.552252 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:25:21.552447 kernel: audit: type=1334 audit(1712946321.548:1602): prog-id=123 op=UNLOAD Apr 12 18:25:21.554000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:25:21.558819 kernel: audit: type=1334 audit(1712946321.554:1603): prog-id=126 op=UNLOAD Apr 12 18:25:21.588338 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131-rootfs.mount: Deactivated successfully. Apr 12 18:25:21.590331 env[1686]: time="2024-04-12T18:25:21.590209884Z" level=info msg="shim disconnected" id=d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131 Apr 12 18:25:21.590331 env[1686]: time="2024-04-12T18:25:21.590328617Z" level=warning msg="cleaning up after shim disconnected" id=d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131 namespace=k8s.io Apr 12 18:25:21.590965 env[1686]: time="2024-04-12T18:25:21.590352879Z" level=info msg="cleaning up dead shim" Apr 12 18:25:21.606560 env[1686]: time="2024-04-12T18:25:21.606493718Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:25:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5570 runtime=io.containerd.runc.v2\n" Apr 12 18:25:21.867533 kubelet[2894]: I0412 18:25:21.867388 2894 scope.go:117] "RemoveContainer" containerID="d0111e62468ad5178fd3bedd1b0c51c77471454a580c155ccf0332fced59c131" Apr 12 18:25:21.872200 env[1686]: time="2024-04-12T18:25:21.872146308Z" level=info msg="CreateContainer within sandbox \"78d3dd7f1f286ce1c0c3b64466947eae34145202a64c899d09f299540642cb54\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Apr 12 18:25:21.897377 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1413379269.mount: Deactivated successfully. Apr 12 18:25:21.908749 env[1686]: time="2024-04-12T18:25:21.908665343Z" level=info msg="CreateContainer within sandbox \"78d3dd7f1f286ce1c0c3b64466947eae34145202a64c899d09f299540642cb54\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"77d53a24648e0047ccf4f92fd0b31bf18f945324d05a3be69540377358d1b447\"" Apr 12 18:25:21.909653 env[1686]: time="2024-04-12T18:25:21.909609574Z" level=info msg="StartContainer for \"77d53a24648e0047ccf4f92fd0b31bf18f945324d05a3be69540377358d1b447\"" Apr 12 18:25:21.948785 systemd[1]: Started cri-containerd-77d53a24648e0047ccf4f92fd0b31bf18f945324d05a3be69540377358d1b447.scope. Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.000595 kernel: audit: type=1400 audit(1712946321.984:1604): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.000747 kernel: audit: type=1400 audit(1712946321.984:1605): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008724 kernel: audit: type=1400 audit(1712946321.984:1606): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.017521 kernel: audit: type=1400 audit(1712946321.984:1607): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.029695 kernel: audit: type=1400 audit(1712946321.984:1608): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.044270 kernel: audit: type=1400 audit(1712946321.984:1609): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.056777 kernel: audit: type=1400 audit(1712946321.984:1610): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.065729 kernel: audit: type=1400 audit(1712946321.984:1611): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.991000 audit: BPF prog-id=194 op=LOAD Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3082 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:21.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643533613234363438653030343763636634663932666430623331 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3082 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:21.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643533613234363438653030343763636634663932666430623331 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.992000 audit: BPF prog-id=195 op=LOAD Apr 12 18:25:21.992000 audit[5591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3082 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:21.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643533613234363438653030343763636634663932666430623331 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:21.999000 audit: BPF prog-id=196 op=LOAD Apr 12 18:25:21.999000 audit[5591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3082 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:21.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643533613234363438653030343763636634663932666430623331 Apr 12 18:25:22.008000 audit: BPF prog-id=196 op=UNLOAD Apr 12 18:25:22.008000 audit: BPF prog-id=195 op=UNLOAD Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { perfmon } for pid=5591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit[5591]: AVC avc: denied { bpf } for pid=5591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.008000 audit: BPF prog-id=197 op=LOAD Apr 12 18:25:22.008000 audit[5591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3082 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:22.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643533613234363438653030343763636634663932666430623331 Apr 12 18:25:22.074882 env[1686]: time="2024-04-12T18:25:22.072503403Z" level=info msg="StartContainer for \"77d53a24648e0047ccf4f92fd0b31bf18f945324d05a3be69540377358d1b447\" returns successfully" Apr 12 18:25:22.139059 systemd[1]: cri-containerd-3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114.scope: Deactivated successfully. Apr 12 18:25:22.139670 systemd[1]: cri-containerd-3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114.scope: Consumed 7.155s CPU time. Apr 12 18:25:22.144000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:25:22.144000 audit: BPF prog-id=96 op=UNLOAD Apr 12 18:25:22.188426 env[1686]: time="2024-04-12T18:25:22.188350510Z" level=info msg="shim disconnected" id=3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114 Apr 12 18:25:22.188426 env[1686]: time="2024-04-12T18:25:22.188422590Z" level=warning msg="cleaning up after shim disconnected" id=3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114 namespace=k8s.io Apr 12 18:25:22.188666 env[1686]: time="2024-04-12T18:25:22.188445748Z" level=info msg="cleaning up dead shim" Apr 12 18:25:22.209588 env[1686]: time="2024-04-12T18:25:22.209499315Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:25:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5630 runtime=io.containerd.runc.v2\n" Apr 12 18:25:22.588059 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114-rootfs.mount: Deactivated successfully. Apr 12 18:25:22.872127 kubelet[2894]: I0412 18:25:22.871712 2894 scope.go:117] "RemoveContainer" containerID="3764a5cf577c5090a8915b873ca76b0e6127c02ce9bc897019f09c15ba6ba114" Apr 12 18:25:22.876754 env[1686]: time="2024-04-12T18:25:22.876662587Z" level=info msg="CreateContainer within sandbox \"0de67dd958339f5fe0ba11fceecefe514163eb5c801474add465082794a11f3f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Apr 12 18:25:22.901599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3051739516.mount: Deactivated successfully. Apr 12 18:25:22.910298 env[1686]: time="2024-04-12T18:25:22.910192446Z" level=info msg="CreateContainer within sandbox \"0de67dd958339f5fe0ba11fceecefe514163eb5c801474add465082794a11f3f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"ebe3683756149aecef55e1df62faf8e6791d66b43582da2d725b9829fa49aa91\"" Apr 12 18:25:22.911178 env[1686]: time="2024-04-12T18:25:22.911132369Z" level=info msg="StartContainer for \"ebe3683756149aecef55e1df62faf8e6791d66b43582da2d725b9829fa49aa91\"" Apr 12 18:25:22.949154 systemd[1]: Started cri-containerd-ebe3683756149aecef55e1df62faf8e6791d66b43582da2d725b9829fa49aa91.scope. Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.985000 audit: BPF prog-id=198 op=LOAD Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2437 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:22.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653336383337353631343961656365663535653164663632666166 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2437 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:22.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653336383337353631343961656365663535653164663632666166 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit: BPF prog-id=199 op=LOAD Apr 12 18:25:22.987000 audit[5656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2437 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:22.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653336383337353631343961656365663535653164663632666166 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.987000 audit: BPF prog-id=200 op=LOAD Apr 12 18:25:22.987000 audit[5656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2437 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:22.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653336383337353631343961656365663535653164663632666166 Apr 12 18:25:22.988000 audit: BPF prog-id=200 op=UNLOAD Apr 12 18:25:22.988000 audit: BPF prog-id=199 op=UNLOAD Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { perfmon } for pid=5656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit[5656]: AVC avc: denied { bpf } for pid=5656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:22.988000 audit: BPF prog-id=201 op=LOAD Apr 12 18:25:22.988000 audit[5656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2437 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:22.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653336383337353631343961656365663535653164663632666166 Apr 12 18:25:23.051525 env[1686]: time="2024-04-12T18:25:23.051456519Z" level=info msg="StartContainer for \"ebe3683756149aecef55e1df62faf8e6791d66b43582da2d725b9829fa49aa91\" returns successfully" Apr 12 18:25:26.064000 audit[5666]: AVC avc: denied { watch } for pid=5666 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:25:26.064000 audit[5666]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000624f00 a2=fc6 a3=0 items=0 ppid=2437 pid=5666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:25:26.064000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:25:26.065000 audit[5666]: AVC avc: denied { watch } for pid=5666 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:25:26.065000 audit[5666]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000f38040 a2=fc6 a3=0 items=0 ppid=2437 pid=5666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c864 key=(null) Apr 12 18:25:26.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:25:27.775647 systemd[1]: cri-containerd-fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d.scope: Deactivated successfully. Apr 12 18:25:27.778081 systemd[1]: cri-containerd-fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d.scope: Consumed 3.516s CPU time. Apr 12 18:25:27.780000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:25:27.782489 kernel: kauditd_printk_skb: 114 callbacks suppressed Apr 12 18:25:27.782639 kernel: audit: type=1334 audit(1712946327.780:1644): prog-id=86 op=UNLOAD Apr 12 18:25:27.780000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:25:27.788242 kernel: audit: type=1334 audit(1712946327.780:1645): prog-id=111 op=UNLOAD Apr 12 18:25:27.820884 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d-rootfs.mount: Deactivated successfully. Apr 12 18:25:27.822870 env[1686]: time="2024-04-12T18:25:27.822810027Z" level=info msg="shim disconnected" id=fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d Apr 12 18:25:27.823855 env[1686]: time="2024-04-12T18:25:27.823804763Z" level=warning msg="cleaning up after shim disconnected" id=fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d namespace=k8s.io Apr 12 18:25:27.824013 env[1686]: time="2024-04-12T18:25:27.823969742Z" level=info msg="cleaning up dead shim" Apr 12 18:25:27.837386 env[1686]: time="2024-04-12T18:25:27.837327502Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:25:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5721 runtime=io.containerd.runc.v2\n" Apr 12 18:25:27.899420 kubelet[2894]: I0412 18:25:27.899338 2894 scope.go:117] "RemoveContainer" containerID="fc27a817b0606c464d5800130d50a9a710942d54c1927089b9a6a7bccdee637d" Apr 12 18:25:27.904457 env[1686]: time="2024-04-12T18:25:27.904380623Z" level=info msg="CreateContainer within sandbox \"33fe46931a740ca1098763a2877465c1ba5ff0f507175145682c3f8626cd3d04\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Apr 12 18:25:27.931079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2831742479.mount: Deactivated successfully. Apr 12 18:25:27.938699 env[1686]: time="2024-04-12T18:25:27.938620488Z" level=info msg="CreateContainer within sandbox \"33fe46931a740ca1098763a2877465c1ba5ff0f507175145682c3f8626cd3d04\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"d7c1a28ad50da12854ff8f0c0ba97cf1b057e344c43997d42298072a1121d6f1\"" Apr 12 18:25:27.939545 env[1686]: time="2024-04-12T18:25:27.939483607Z" level=info msg="StartContainer for \"d7c1a28ad50da12854ff8f0c0ba97cf1b057e344c43997d42298072a1121d6f1\"" Apr 12 18:25:27.978757 systemd[1]: Started cri-containerd-d7c1a28ad50da12854ff8f0c0ba97cf1b057e344c43997d42298072a1121d6f1.scope. Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.025255 kernel: audit: type=1400 audit(1712946328.016:1646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.043291 kernel: audit: type=1400 audit(1712946328.016:1647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.043437 kernel: audit: type=1400 audit(1712946328.016:1648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.052105 kernel: audit: type=1400 audit(1712946328.016:1649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.060078 kernel: audit: type=1400 audit(1712946328.016:1650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.068115 kernel: audit: type=1400 audit(1712946328.016:1651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.075929 kernel: audit: type=1400 audit(1712946328.016:1652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.083682 kernel: audit: type=1400 audit(1712946328.016:1653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.024000 audit: BPF prog-id=202 op=LOAD Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2412 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:28.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633161323861643530646131323835346666386630633062613937 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2412 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:28.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633161323861643530646131323835346666386630633062613937 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.030000 audit: BPF prog-id=203 op=LOAD Apr 12 18:25:28.030000 audit[5742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2412 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:28.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633161323861643530646131323835346666386630633062613937 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.034000 audit: BPF prog-id=204 op=LOAD Apr 12 18:25:28.034000 audit[5742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2412 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:28.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633161323861643530646131323835346666386630633062613937 Apr 12 18:25:28.046000 audit: BPF prog-id=204 op=UNLOAD Apr 12 18:25:28.046000 audit: BPF prog-id=203 op=UNLOAD Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:25:28.046000 audit: BPF prog-id=205 op=LOAD Apr 12 18:25:28.046000 audit[5742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2412 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:25:28.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633161323861643530646131323835346666386630633062613937 Apr 12 18:25:28.122322 env[1686]: time="2024-04-12T18:25:28.122206359Z" level=info msg="StartContainer for \"d7c1a28ad50da12854ff8f0c0ba97cf1b057e344c43997d42298072a1121d6f1\" returns successfully" Apr 12 18:25:30.776057 kubelet[2894]: E0412 18:25:30.776017 2894 controller.go:195] "Failed to update lease" err="Put \"https://172.31.28.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-18?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:25:40.778076 kubelet[2894]: E0412 18:25:40.777749 2894 controller.go:195] "Failed to update lease" err="Put \"https://172.31.28.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-18?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:25:42.088816 systemd[1]: run-containerd-runc-k8s.io-73ccf608176845f4f68fce943eaa65987bd4191f03b1794bc502dc0ce86b6f09-runc.VjjfGZ.mount: Deactivated successfully.