Apr 12 18:20:34.952969 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Apr 12 18:20:34.953006 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:20:34.953029 kernel: efi: EFI v2.70 by EDK II Apr 12 18:20:34.953045 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x7174cf98 Apr 12 18:20:34.953059 kernel: ACPI: Early table checksum verification disabled Apr 12 18:20:34.953073 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Apr 12 18:20:34.953089 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Apr 12 18:20:34.953104 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Apr 12 18:20:34.953117 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Apr 12 18:20:34.953131 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Apr 12 18:20:34.953149 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Apr 12 18:20:34.953163 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Apr 12 18:20:34.953177 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Apr 12 18:20:34.953191 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Apr 12 18:20:34.953208 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Apr 12 18:20:34.953227 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Apr 12 18:20:34.953241 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Apr 12 18:20:34.953255 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Apr 12 18:20:34.953270 kernel: printk: bootconsole [uart0] enabled Apr 12 18:20:34.953284 kernel: NUMA: Failed to initialise from firmware Apr 12 18:20:34.953299 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Apr 12 18:20:34.953313 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Apr 12 18:20:34.953328 kernel: Zone ranges: Apr 12 18:20:34.953343 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Apr 12 18:20:34.953357 kernel: DMA32 empty Apr 12 18:20:34.953371 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Apr 12 18:20:34.953390 kernel: Movable zone start for each node Apr 12 18:20:34.953405 kernel: Early memory node ranges Apr 12 18:20:34.953419 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Apr 12 18:20:34.953434 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Apr 12 18:20:34.953448 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Apr 12 18:20:34.953462 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Apr 12 18:20:34.953477 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Apr 12 18:20:34.953491 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Apr 12 18:20:34.953506 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Apr 12 18:20:34.953520 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Apr 12 18:20:34.953534 kernel: psci: probing for conduit method from ACPI. Apr 12 18:20:34.953549 kernel: psci: PSCIv1.0 detected in firmware. Apr 12 18:20:34.953567 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:20:34.953582 kernel: psci: Trusted OS migration not required Apr 12 18:20:34.953603 kernel: psci: SMC Calling Convention v1.1 Apr 12 18:20:34.953618 kernel: ACPI: SRAT not present Apr 12 18:20:34.953634 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:20:34.953653 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:20:34.953669 kernel: pcpu-alloc: [0] 0 [0] 1 Apr 12 18:20:34.953684 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:20:34.953699 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:20:34.953714 kernel: CPU features: detected: Spectre-v2 Apr 12 18:20:34.953729 kernel: CPU features: detected: Spectre-v3a Apr 12 18:20:34.953744 kernel: CPU features: detected: Spectre-BHB Apr 12 18:20:34.953759 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:20:34.953774 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:20:34.953790 kernel: CPU features: detected: ARM erratum 1742098 Apr 12 18:20:34.953805 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Apr 12 18:20:34.953824 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Apr 12 18:20:34.953839 kernel: Policy zone: Normal Apr 12 18:20:34.953883 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:20:34.953903 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:20:34.953919 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:20:34.953934 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:20:34.953950 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:20:34.953966 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Apr 12 18:20:34.953982 kernel: Memory: 3824652K/4030464K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 205812K reserved, 0K cma-reserved) Apr 12 18:20:34.953998 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:20:34.954033 kernel: trace event string verifier disabled Apr 12 18:20:34.954053 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:20:34.954070 kernel: rcu: RCU event tracing is enabled. Apr 12 18:20:34.954086 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:20:34.954101 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:20:34.954117 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:20:34.954132 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:20:34.954148 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:20:34.954162 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:20:34.954177 kernel: GICv3: 96 SPIs implemented Apr 12 18:20:34.954192 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:20:34.954207 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:20:34.954227 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:20:34.954241 kernel: GICv3: 16 PPIs implemented Apr 12 18:20:34.954256 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Apr 12 18:20:34.954271 kernel: ACPI: SRAT not present Apr 12 18:20:34.954286 kernel: ITS [mem 0x10080000-0x1009ffff] Apr 12 18:20:34.954301 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 18:20:34.954317 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Apr 12 18:20:34.954332 kernel: GICv3: using LPI property table @0x00000004000c0000 Apr 12 18:20:34.954347 kernel: ITS: Using hypervisor restricted LPI range [128] Apr 12 18:20:34.954362 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Apr 12 18:20:34.954377 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Apr 12 18:20:34.954396 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Apr 12 18:20:34.954411 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Apr 12 18:20:34.954426 kernel: Console: colour dummy device 80x25 Apr 12 18:20:34.954442 kernel: printk: console [tty1] enabled Apr 12 18:20:34.954457 kernel: ACPI: Core revision 20210730 Apr 12 18:20:34.954473 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Apr 12 18:20:34.954489 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:20:34.954504 kernel: LSM: Security Framework initializing Apr 12 18:20:34.954520 kernel: SELinux: Initializing. Apr 12 18:20:34.954535 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:20:34.954555 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:20:34.954570 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:20:34.954586 kernel: Platform MSI: ITS@0x10080000 domain created Apr 12 18:20:34.954601 kernel: PCI/MSI: ITS@0x10080000 domain created Apr 12 18:20:34.954616 kernel: Remapping and enabling EFI services. Apr 12 18:20:34.954632 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:20:34.954647 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:20:34.954662 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Apr 12 18:20:34.954678 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Apr 12 18:20:34.954698 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Apr 12 18:20:34.954713 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:20:34.954728 kernel: SMP: Total of 2 processors activated. Apr 12 18:20:34.954744 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:20:34.954760 kernel: CPU features: detected: 32-bit EL1 Support Apr 12 18:20:34.954775 kernel: CPU features: detected: CRC32 instructions Apr 12 18:20:34.954791 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:20:34.954806 kernel: alternatives: patching kernel code Apr 12 18:20:34.954822 kernel: devtmpfs: initialized Apr 12 18:20:34.954841 kernel: KASLR disabled due to lack of seed Apr 12 18:20:34.956898 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:20:34.956922 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:20:34.956951 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:20:34.956972 kernel: SMBIOS 3.0.0 present. Apr 12 18:20:34.956989 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Apr 12 18:20:34.957005 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:20:34.957022 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:20:34.957038 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:20:34.957055 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:20:34.957071 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:20:34.957087 kernel: audit: type=2000 audit(0.248:1): state=initialized audit_enabled=0 res=1 Apr 12 18:20:34.957108 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:20:34.957124 kernel: cpuidle: using governor menu Apr 12 18:20:34.957140 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:20:34.957156 kernel: ASID allocator initialised with 32768 entries Apr 12 18:20:34.957173 kernel: ACPI: bus type PCI registered Apr 12 18:20:34.957193 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:20:34.957209 kernel: Serial: AMBA PL011 UART driver Apr 12 18:20:34.957225 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:20:34.957242 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:20:34.957258 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:20:34.957274 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:20:34.957290 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:20:34.957306 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:20:34.957322 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:20:34.957342 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:20:34.957358 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:20:34.957374 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:20:34.957390 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:20:34.957406 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:20:34.957422 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:20:34.957439 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:20:34.957455 kernel: ACPI: Interpreter enabled Apr 12 18:20:34.957471 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:20:34.957490 kernel: ACPI: MCFG table detected, 1 entries Apr 12 18:20:34.957507 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Apr 12 18:20:34.957792 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:20:34.965737 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Apr 12 18:20:34.967987 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Apr 12 18:20:34.968189 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Apr 12 18:20:34.968379 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Apr 12 18:20:34.968411 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Apr 12 18:20:34.968429 kernel: acpiphp: Slot [1] registered Apr 12 18:20:34.968445 kernel: acpiphp: Slot [2] registered Apr 12 18:20:34.968462 kernel: acpiphp: Slot [3] registered Apr 12 18:20:34.968478 kernel: acpiphp: Slot [4] registered Apr 12 18:20:34.968494 kernel: acpiphp: Slot [5] registered Apr 12 18:20:34.968510 kernel: acpiphp: Slot [6] registered Apr 12 18:20:34.968526 kernel: acpiphp: Slot [7] registered Apr 12 18:20:34.968542 kernel: acpiphp: Slot [8] registered Apr 12 18:20:34.968562 kernel: acpiphp: Slot [9] registered Apr 12 18:20:34.968579 kernel: acpiphp: Slot [10] registered Apr 12 18:20:34.968595 kernel: acpiphp: Slot [11] registered Apr 12 18:20:34.968611 kernel: acpiphp: Slot [12] registered Apr 12 18:20:34.968627 kernel: acpiphp: Slot [13] registered Apr 12 18:20:34.968643 kernel: acpiphp: Slot [14] registered Apr 12 18:20:34.968659 kernel: acpiphp: Slot [15] registered Apr 12 18:20:34.968675 kernel: acpiphp: Slot [16] registered Apr 12 18:20:34.968691 kernel: acpiphp: Slot [17] registered Apr 12 18:20:34.968706 kernel: acpiphp: Slot [18] registered Apr 12 18:20:34.968726 kernel: acpiphp: Slot [19] registered Apr 12 18:20:34.968742 kernel: acpiphp: Slot [20] registered Apr 12 18:20:34.968758 kernel: acpiphp: Slot [21] registered Apr 12 18:20:34.968774 kernel: acpiphp: Slot [22] registered Apr 12 18:20:34.968790 kernel: acpiphp: Slot [23] registered Apr 12 18:20:34.968806 kernel: acpiphp: Slot [24] registered Apr 12 18:20:34.968822 kernel: acpiphp: Slot [25] registered Apr 12 18:20:34.968839 kernel: acpiphp: Slot [26] registered Apr 12 18:20:34.968876 kernel: acpiphp: Slot [27] registered Apr 12 18:20:34.968900 kernel: acpiphp: Slot [28] registered Apr 12 18:20:34.968917 kernel: acpiphp: Slot [29] registered Apr 12 18:20:34.968933 kernel: acpiphp: Slot [30] registered Apr 12 18:20:34.968950 kernel: acpiphp: Slot [31] registered Apr 12 18:20:34.968966 kernel: PCI host bridge to bus 0000:00 Apr 12 18:20:34.969164 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Apr 12 18:20:34.969341 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Apr 12 18:20:34.969514 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Apr 12 18:20:34.969689 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Apr 12 18:20:34.972989 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Apr 12 18:20:34.973217 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Apr 12 18:20:34.973415 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Apr 12 18:20:34.973621 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Apr 12 18:20:34.973814 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Apr 12 18:20:34.974146 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 18:20:34.975766 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Apr 12 18:20:34.976004 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Apr 12 18:20:34.976202 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Apr 12 18:20:34.976394 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Apr 12 18:20:34.976587 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 18:20:34.976777 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Apr 12 18:20:34.986945 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Apr 12 18:20:34.987171 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Apr 12 18:20:34.987368 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Apr 12 18:20:34.987568 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Apr 12 18:20:34.987749 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Apr 12 18:20:34.988016 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Apr 12 18:20:34.988195 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Apr 12 18:20:34.988226 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Apr 12 18:20:34.988244 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Apr 12 18:20:34.988261 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Apr 12 18:20:34.988278 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Apr 12 18:20:34.988294 kernel: iommu: Default domain type: Translated Apr 12 18:20:34.988311 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:20:34.988328 kernel: vgaarb: loaded Apr 12 18:20:34.988344 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:20:34.988361 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:20:34.988381 kernel: PTP clock support registered Apr 12 18:20:34.988398 kernel: Registered efivars operations Apr 12 18:20:34.988414 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:20:34.988431 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:20:34.988448 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:20:34.988465 kernel: pnp: PnP ACPI init Apr 12 18:20:34.988674 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Apr 12 18:20:34.988698 kernel: pnp: PnP ACPI: found 1 devices Apr 12 18:20:34.988715 kernel: NET: Registered PF_INET protocol family Apr 12 18:20:34.988737 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:20:34.988753 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:20:34.988770 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:20:34.988786 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:20:34.988803 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:20:34.988820 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:20:34.988836 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:20:34.988871 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:20:34.988891 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:20:34.988913 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:20:34.988930 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Apr 12 18:20:34.988947 kernel: kvm [1]: HYP mode not available Apr 12 18:20:34.988963 kernel: Initialise system trusted keyrings Apr 12 18:20:34.988980 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:20:34.988997 kernel: Key type asymmetric registered Apr 12 18:20:34.989013 kernel: Asymmetric key parser 'x509' registered Apr 12 18:20:34.989030 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:20:34.989046 kernel: io scheduler mq-deadline registered Apr 12 18:20:34.989066 kernel: io scheduler kyber registered Apr 12 18:20:34.989082 kernel: io scheduler bfq registered Apr 12 18:20:34.989288 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Apr 12 18:20:34.989313 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 18:20:34.989330 kernel: ACPI: button: Power Button [PWRB] Apr 12 18:20:34.989347 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:20:34.989364 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Apr 12 18:20:34.989553 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Apr 12 18:20:34.989580 kernel: printk: console [ttyS0] disabled Apr 12 18:20:34.989597 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Apr 12 18:20:34.989613 kernel: printk: console [ttyS0] enabled Apr 12 18:20:34.989629 kernel: printk: bootconsole [uart0] disabled Apr 12 18:20:34.989645 kernel: thunder_xcv, ver 1.0 Apr 12 18:20:34.989662 kernel: thunder_bgx, ver 1.0 Apr 12 18:20:34.989678 kernel: nicpf, ver 1.0 Apr 12 18:20:34.989694 kernel: nicvf, ver 1.0 Apr 12 18:20:34.991947 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:20:34.992149 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:20:34 UTC (1712946034) Apr 12 18:20:34.992172 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:20:34.992190 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:20:34.992207 kernel: Segment Routing with IPv6 Apr 12 18:20:34.992224 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:20:34.992240 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:20:34.992257 kernel: Key type dns_resolver registered Apr 12 18:20:34.992273 kernel: registered taskstats version 1 Apr 12 18:20:34.992294 kernel: Loading compiled-in X.509 certificates Apr 12 18:20:34.992311 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:20:34.992327 kernel: Key type .fscrypt registered Apr 12 18:20:34.992343 kernel: Key type fscrypt-provisioning registered Apr 12 18:20:34.992358 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:20:34.992374 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:20:34.992390 kernel: ima: No architecture policies found Apr 12 18:20:34.992407 kernel: Freeing unused kernel memory: 36352K Apr 12 18:20:34.992423 kernel: Run /init as init process Apr 12 18:20:34.992443 kernel: with arguments: Apr 12 18:20:34.992459 kernel: /init Apr 12 18:20:34.992475 kernel: with environment: Apr 12 18:20:34.992490 kernel: HOME=/ Apr 12 18:20:34.992506 kernel: TERM=linux Apr 12 18:20:34.992523 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:20:34.992544 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:20:34.992565 systemd[1]: Detected virtualization amazon. Apr 12 18:20:34.992587 systemd[1]: Detected architecture arm64. Apr 12 18:20:34.992604 systemd[1]: Running in initrd. Apr 12 18:20:34.992622 systemd[1]: No hostname configured, using default hostname. Apr 12 18:20:34.992639 systemd[1]: Hostname set to . Apr 12 18:20:34.992657 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:20:34.992675 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:20:34.992693 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:20:34.992710 systemd[1]: Reached target cryptsetup.target. Apr 12 18:20:34.992731 systemd[1]: Reached target paths.target. Apr 12 18:20:34.992749 systemd[1]: Reached target slices.target. Apr 12 18:20:34.992766 systemd[1]: Reached target swap.target. Apr 12 18:20:34.992783 systemd[1]: Reached target timers.target. Apr 12 18:20:34.992801 systemd[1]: Listening on iscsid.socket. Apr 12 18:20:34.992819 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:20:34.992836 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:20:34.992891 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:20:34.992917 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:20:34.992936 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:20:34.992954 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:20:34.992972 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:20:34.992989 systemd[1]: Reached target sockets.target. Apr 12 18:20:34.993007 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:20:34.993024 systemd[1]: Finished network-cleanup.service. Apr 12 18:20:34.993042 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:20:34.993060 systemd[1]: Starting systemd-journald.service... Apr 12 18:20:34.993081 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:20:34.993099 systemd[1]: Starting systemd-resolved.service... Apr 12 18:20:34.993116 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:20:34.993134 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:20:34.993152 kernel: audit: type=1130 audit(1712946034.956:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:34.993170 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:20:34.993188 kernel: audit: type=1130 audit(1712946034.975:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:34.993206 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:20:34.993231 systemd-journald[268]: Journal started Apr 12 18:20:34.993313 systemd-journald[268]: Runtime Journal (/run/log/journal/ec2bcdb82ab23dd4cb5188b3ab571e8c) is 8.0M, max 75.4M, 67.4M free. Apr 12 18:20:34.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:34.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:34.947922 systemd-modules-load[269]: Inserted module 'overlay' Apr 12 18:20:34.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.009992 kernel: audit: type=1130 audit(1712946034.999:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.010049 systemd[1]: Started systemd-journald.service. Apr 12 18:20:35.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.033878 kernel: audit: type=1130 audit(1712946035.019:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.033932 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:20:35.039169 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:20:35.044407 systemd-modules-load[269]: Inserted module 'br_netfilter' Apr 12 18:20:35.045597 kernel: Bridge firewalling registered Apr 12 18:20:35.047390 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:20:35.055871 systemd-resolved[270]: Positive Trust Anchors: Apr 12 18:20:35.055896 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:20:35.055952 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:20:35.085160 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:20:35.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.117893 kernel: audit: type=1130 audit(1712946035.100:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.117964 kernel: SCSI subsystem initialized Apr 12 18:20:35.126160 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:20:35.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.156142 kernel: audit: type=1130 audit(1712946035.140:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.156190 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:20:35.156214 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:20:35.161881 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:20:35.157230 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:20:35.171917 systemd-modules-load[269]: Inserted module 'dm_multipath' Apr 12 18:20:35.175014 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:20:35.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.187101 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:20:35.192931 kernel: audit: type=1130 audit(1712946035.175:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.206702 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:20:35.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.217207 dracut-cmdline[285]: dracut-dracut-053 Apr 12 18:20:35.217207 dracut-cmdline[285]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:20:35.230290 kernel: audit: type=1130 audit(1712946035.208:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.341884 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:20:35.362904 kernel: iscsi: registered transport (tcp) Apr 12 18:20:35.387890 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:20:35.387957 kernel: QLogic iSCSI HBA Driver Apr 12 18:20:35.528655 systemd-resolved[270]: Defaulting to hostname 'linux'. Apr 12 18:20:35.530531 kernel: random: crng init done Apr 12 18:20:35.531920 systemd[1]: Started systemd-resolved.service. Apr 12 18:20:35.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.535052 systemd[1]: Reached target nss-lookup.target. Apr 12 18:20:35.545267 kernel: audit: type=1130 audit(1712946035.533:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.553437 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:20:35.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:35.558056 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:20:35.630898 kernel: raid6: neonx8 gen() 6417 MB/s Apr 12 18:20:35.645882 kernel: raid6: neonx8 xor() 4595 MB/s Apr 12 18:20:35.663881 kernel: raid6: neonx4 gen() 6618 MB/s Apr 12 18:20:35.681882 kernel: raid6: neonx4 xor() 4771 MB/s Apr 12 18:20:35.699881 kernel: raid6: neonx2 gen() 5844 MB/s Apr 12 18:20:35.717882 kernel: raid6: neonx2 xor() 4422 MB/s Apr 12 18:20:35.735881 kernel: raid6: neonx1 gen() 4516 MB/s Apr 12 18:20:35.753882 kernel: raid6: neonx1 xor() 3610 MB/s Apr 12 18:20:35.771881 kernel: raid6: int64x8 gen() 3443 MB/s Apr 12 18:20:35.789882 kernel: raid6: int64x8 xor() 2067 MB/s Apr 12 18:20:35.807881 kernel: raid6: int64x4 gen() 3849 MB/s Apr 12 18:20:35.825881 kernel: raid6: int64x4 xor() 2176 MB/s Apr 12 18:20:35.843881 kernel: raid6: int64x2 gen() 3621 MB/s Apr 12 18:20:35.861881 kernel: raid6: int64x2 xor() 1934 MB/s Apr 12 18:20:35.879881 kernel: raid6: int64x1 gen() 2762 MB/s Apr 12 18:20:35.899295 kernel: raid6: int64x1 xor() 1406 MB/s Apr 12 18:20:35.899324 kernel: raid6: using algorithm neonx4 gen() 6618 MB/s Apr 12 18:20:35.899348 kernel: raid6: .... xor() 4771 MB/s, rmw enabled Apr 12 18:20:35.901057 kernel: raid6: using neon recovery algorithm Apr 12 18:20:35.919888 kernel: xor: measuring software checksum speed Apr 12 18:20:35.921882 kernel: 8regs : 9332 MB/sec Apr 12 18:20:35.924882 kernel: 32regs : 11107 MB/sec Apr 12 18:20:35.928420 kernel: arm64_neon : 9614 MB/sec Apr 12 18:20:35.928452 kernel: xor: using function: 32regs (11107 MB/sec) Apr 12 18:20:36.017909 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:20:36.035091 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:20:36.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:36.035000 audit: BPF prog-id=7 op=LOAD Apr 12 18:20:36.035000 audit: BPF prog-id=8 op=LOAD Apr 12 18:20:36.039935 systemd[1]: Starting systemd-udevd.service... Apr 12 18:20:36.067734 systemd-udevd[469]: Using default interface naming scheme 'v252'. Apr 12 18:20:36.078272 systemd[1]: Started systemd-udevd.service. Apr 12 18:20:36.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:36.084364 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:20:36.114640 dracut-pre-trigger[474]: rd.md=0: removing MD RAID activation Apr 12 18:20:36.174415 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:20:36.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:36.178725 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:20:36.281296 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:20:36.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:36.397184 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Apr 12 18:20:36.397253 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Apr 12 18:20:36.405324 kernel: ena 0000:00:05.0: ENA device version: 0.10 Apr 12 18:20:36.405677 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Apr 12 18:20:36.415071 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Apr 12 18:20:36.415130 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:3f:2e:9f:f3:e1 Apr 12 18:20:36.415397 kernel: nvme nvme0: pci function 0000:00:04.0 Apr 12 18:20:36.420249 (udev-worker)[523]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:20:36.427901 kernel: nvme nvme0: 2/0/0 default/read/poll queues Apr 12 18:20:36.434041 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:20:36.434110 kernel: GPT:9289727 != 16777215 Apr 12 18:20:36.437087 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:20:36.439907 kernel: GPT:9289727 != 16777215 Apr 12 18:20:36.442096 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:20:36.443610 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:20:36.512894 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (529) Apr 12 18:20:36.538502 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:20:36.598070 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:20:36.620978 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:20:36.660441 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:20:36.664639 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:20:36.670824 systemd[1]: Starting disk-uuid.service... Apr 12 18:20:36.682465 disk-uuid[629]: Primary Header is updated. Apr 12 18:20:36.682465 disk-uuid[629]: Secondary Entries is updated. Apr 12 18:20:36.682465 disk-uuid[629]: Secondary Header is updated. Apr 12 18:20:36.693891 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:20:36.702889 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:20:36.709887 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:20:37.709837 disk-uuid[630]: The operation has completed successfully. Apr 12 18:20:37.712122 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:20:37.877881 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:20:37.878450 systemd[1]: Finished disk-uuid.service. Apr 12 18:20:37.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:37.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:37.894272 systemd[1]: Starting verity-setup.service... Apr 12 18:20:37.928137 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:20:38.005996 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:20:38.011598 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:20:38.021696 systemd[1]: Finished verity-setup.service. Apr 12 18:20:38.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.100882 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:20:38.101306 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:20:38.104253 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:20:38.108176 systemd[1]: Starting ignition-setup.service... Apr 12 18:20:38.116581 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:20:38.137071 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:20:38.137141 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:20:38.137165 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:20:38.145881 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:20:38.162756 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:20:38.191289 systemd[1]: Finished ignition-setup.service. Apr 12 18:20:38.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.195719 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:20:38.260492 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:20:38.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.263000 audit: BPF prog-id=9 op=LOAD Apr 12 18:20:38.266065 systemd[1]: Starting systemd-networkd.service... Apr 12 18:20:38.312247 systemd-networkd[1142]: lo: Link UP Apr 12 18:20:38.314091 systemd-networkd[1142]: lo: Gained carrier Apr 12 18:20:38.317040 systemd-networkd[1142]: Enumeration completed Apr 12 18:20:38.318661 systemd[1]: Started systemd-networkd.service. Apr 12 18:20:38.321212 systemd-networkd[1142]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:20:38.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.324553 systemd[1]: Reached target network.target. Apr 12 18:20:38.329028 systemd[1]: Starting iscsiuio.service... Apr 12 18:20:38.331758 systemd-networkd[1142]: eth0: Link UP Apr 12 18:20:38.332996 systemd-networkd[1142]: eth0: Gained carrier Apr 12 18:20:38.355965 systemd[1]: Started iscsiuio.service. Apr 12 18:20:38.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.360674 systemd[1]: Starting iscsid.service... Apr 12 18:20:38.368031 systemd-networkd[1142]: eth0: DHCPv4 address 172.31.20.40/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:20:38.373294 iscsid[1147]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:20:38.373294 iscsid[1147]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:20:38.373294 iscsid[1147]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:20:38.373294 iscsid[1147]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:20:38.390470 iscsid[1147]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:20:38.390470 iscsid[1147]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:20:38.399704 systemd[1]: Started iscsid.service. Apr 12 18:20:38.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.402743 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:20:38.427280 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:20:38.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.428113 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:20:38.428787 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:20:38.430509 systemd[1]: Reached target remote-fs.target. Apr 12 18:20:38.432396 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:20:38.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.453604 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:20:38.795460 ignition[1088]: Ignition 2.14.0 Apr 12 18:20:38.795982 ignition[1088]: Stage: fetch-offline Apr 12 18:20:38.796298 ignition[1088]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:20:38.796357 ignition[1088]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:20:38.816077 ignition[1088]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:20:38.816919 ignition[1088]: Ignition finished successfully Apr 12 18:20:38.822130 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:20:38.832003 kernel: kauditd_printk_skb: 18 callbacks suppressed Apr 12 18:20:38.832048 kernel: audit: type=1130 audit(1712946038.823:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.826791 systemd[1]: Starting ignition-fetch.service... Apr 12 18:20:38.847745 ignition[1166]: Ignition 2.14.0 Apr 12 18:20:38.849406 ignition[1166]: Stage: fetch Apr 12 18:20:38.850974 ignition[1166]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:20:38.853315 ignition[1166]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:20:38.865574 ignition[1166]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:20:38.868262 ignition[1166]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:20:38.892243 ignition[1166]: INFO : PUT result: OK Apr 12 18:20:38.895664 ignition[1166]: DEBUG : parsed url from cmdline: "" Apr 12 18:20:38.897490 ignition[1166]: INFO : no config URL provided Apr 12 18:20:38.897490 ignition[1166]: INFO : reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:20:38.897490 ignition[1166]: INFO : no config at "/usr/lib/ignition/user.ign" Apr 12 18:20:38.897490 ignition[1166]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:20:38.905949 ignition[1166]: INFO : PUT result: OK Apr 12 18:20:38.905949 ignition[1166]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Apr 12 18:20:38.910931 ignition[1166]: INFO : GET result: OK Apr 12 18:20:38.910931 ignition[1166]: DEBUG : parsing config with SHA512: d5edb197d663d9236780a654cdaf04c4a2ea30d0e41c470211ed1eda45aba71a9d26fbd27c10ff11fc4890294db7d0c3fa04597401cceb3c40109b2da5aa7339 Apr 12 18:20:38.977935 unknown[1166]: fetched base config from "system" Apr 12 18:20:38.977964 unknown[1166]: fetched base config from "system" Apr 12 18:20:38.977979 unknown[1166]: fetched user config from "aws" Apr 12 18:20:38.984052 ignition[1166]: fetch: fetch complete Apr 12 18:20:38.984080 ignition[1166]: fetch: fetch passed Apr 12 18:20:38.984169 ignition[1166]: Ignition finished successfully Apr 12 18:20:38.990716 systemd[1]: Finished ignition-fetch.service. Apr 12 18:20:38.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:38.995397 systemd[1]: Starting ignition-kargs.service... Apr 12 18:20:39.005431 kernel: audit: type=1130 audit(1712946038.991:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.017986 ignition[1172]: Ignition 2.14.0 Apr 12 18:20:39.018026 ignition[1172]: Stage: kargs Apr 12 18:20:39.018322 ignition[1172]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:20:39.018380 ignition[1172]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:20:39.033003 ignition[1172]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:20:39.035346 ignition[1172]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:20:39.038691 ignition[1172]: INFO : PUT result: OK Apr 12 18:20:39.043640 ignition[1172]: kargs: kargs passed Apr 12 18:20:39.043734 ignition[1172]: Ignition finished successfully Apr 12 18:20:39.047917 systemd[1]: Finished ignition-kargs.service. Apr 12 18:20:39.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.058894 kernel: audit: type=1130 audit(1712946039.047:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.059255 systemd[1]: Starting ignition-disks.service... Apr 12 18:20:39.073706 ignition[1178]: Ignition 2.14.0 Apr 12 18:20:39.073734 ignition[1178]: Stage: disks Apr 12 18:20:39.074077 ignition[1178]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:20:39.074135 ignition[1178]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:20:39.086043 ignition[1178]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:20:39.088309 ignition[1178]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:20:39.091146 ignition[1178]: INFO : PUT result: OK Apr 12 18:20:39.096546 ignition[1178]: disks: disks passed Apr 12 18:20:39.096650 ignition[1178]: Ignition finished successfully Apr 12 18:20:39.100820 systemd[1]: Finished ignition-disks.service. Apr 12 18:20:39.103988 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:20:39.107295 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:20:39.131593 kernel: audit: type=1130 audit(1712946039.102:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.115771 systemd[1]: Reached target local-fs.target. Apr 12 18:20:39.117448 systemd[1]: Reached target sysinit.target. Apr 12 18:20:39.118432 systemd[1]: Reached target basic.target. Apr 12 18:20:39.120780 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:20:39.156331 systemd-fsck[1185]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 18:20:39.165646 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:20:39.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.169731 systemd[1]: Mounting sysroot.mount... Apr 12 18:20:39.179054 kernel: audit: type=1130 audit(1712946039.166:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.192900 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:20:39.194696 systemd[1]: Mounted sysroot.mount. Apr 12 18:20:39.195702 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:20:39.206781 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:20:39.213324 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:20:39.213775 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:20:39.213833 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:20:39.228500 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:20:39.249317 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:20:39.254302 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:20:39.274247 initrd-setup-root[1207]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:20:39.279287 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1202) Apr 12 18:20:39.286129 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:20:39.286196 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:20:39.286220 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:20:39.296907 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:20:39.296993 initrd-setup-root[1233]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:20:39.303330 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:20:39.310925 initrd-setup-root[1241]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:20:39.320026 initrd-setup-root[1249]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:20:39.510045 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:20:39.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.514402 systemd[1]: Starting ignition-mount.service... Apr 12 18:20:39.525889 kernel: audit: type=1130 audit(1712946039.510:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.526364 systemd[1]: Starting sysroot-boot.service... Apr 12 18:20:39.534089 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:20:39.534649 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:20:39.562303 ignition[1268]: INFO : Ignition 2.14.0 Apr 12 18:20:39.562303 ignition[1268]: INFO : Stage: mount Apr 12 18:20:39.565699 ignition[1268]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:20:39.565699 ignition[1268]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:20:39.584424 systemd[1]: Finished sysroot-boot.service. Apr 12 18:20:39.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.595667 ignition[1268]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:20:39.598170 kernel: audit: type=1130 audit(1712946039.584:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.598250 ignition[1268]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:20:39.601436 ignition[1268]: INFO : PUT result: OK Apr 12 18:20:39.606904 ignition[1268]: INFO : mount: mount passed Apr 12 18:20:39.608538 ignition[1268]: INFO : Ignition finished successfully Apr 12 18:20:39.610734 systemd[1]: Finished ignition-mount.service. Apr 12 18:20:39.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.618023 systemd[1]: Starting ignition-files.service... Apr 12 18:20:39.624989 kernel: audit: type=1130 audit(1712946039.610:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:20:39.635442 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:20:39.653897 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1277) Apr 12 18:20:39.659390 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:20:39.659424 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:20:39.659448 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:20:39.667887 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:20:39.672642 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:20:39.690024 ignition[1296]: INFO : Ignition 2.14.0 Apr 12 18:20:39.690024 ignition[1296]: INFO : Stage: files Apr 12 18:20:39.693332 ignition[1296]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:20:39.693332 ignition[1296]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:20:39.709921 ignition[1296]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:20:39.712822 ignition[1296]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:20:39.715648 ignition[1296]: INFO : PUT result: OK Apr 12 18:20:39.721330 ignition[1296]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:20:39.725451 ignition[1296]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:20:39.725451 ignition[1296]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:20:39.768401 ignition[1296]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:20:39.771328 ignition[1296]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:20:39.775070 unknown[1296]: wrote ssh authorized keys file for user: core Apr 12 18:20:39.777313 ignition[1296]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:20:39.785061 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:20:39.789179 ignition[1296]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:20:40.233017 systemd-networkd[1142]: eth0: Gained IPv6LL Apr 12 18:20:40.265605 ignition[1296]: INFO : GET result: OK Apr 12 18:20:40.784483 ignition[1296]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:20:40.789980 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:20:40.789980 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:20:40.789980 ignition[1296]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 18:20:40.869623 ignition[1296]: INFO : GET result: OK Apr 12 18:20:41.008158 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:20:41.012314 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:20:41.012314 ignition[1296]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:20:41.482083 ignition[1296]: INFO : GET result: OK Apr 12 18:20:41.759593 ignition[1296]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:20:41.764366 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:20:41.764366 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:20:41.771438 ignition[1296]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Apr 12 18:20:42.150660 ignition[1296]: INFO : GET result: OK Apr 12 18:20:46.796322 ignition[1296]: DEBUG : file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Apr 12 18:20:46.801314 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:20:46.801314 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:20:46.801314 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:20:46.818654 ignition[1296]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3960189671" Apr 12 18:20:46.825305 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1301) Apr 12 18:20:46.825368 ignition[1296]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3960189671": device or resource busy Apr 12 18:20:46.825368 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3960189671", trying btrfs: device or resource busy Apr 12 18:20:46.825368 ignition[1296]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3960189671" Apr 12 18:20:46.838020 ignition[1296]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3960189671" Apr 12 18:20:46.852645 ignition[1296]: INFO : op(3): [started] unmounting "/mnt/oem3960189671" Apr 12 18:20:46.857233 systemd[1]: mnt-oem3960189671.mount: Deactivated successfully. Apr 12 18:20:46.860189 ignition[1296]: INFO : op(3): [finished] unmounting "/mnt/oem3960189671" Apr 12 18:20:46.862541 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:20:46.865968 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:20:46.869258 ignition[1296]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:20:47.096799 ignition[1296]: INFO : GET result: OK Apr 12 18:20:53.907627 ignition[1296]: DEBUG : file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Apr 12 18:20:53.912616 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:20:53.912616 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:20:53.912616 ignition[1296]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:20:54.161092 ignition[1296]: INFO : GET result: OK Apr 12 18:21:10.072768 ignition[1296]: DEBUG : file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:21:10.078758 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:21:10.078758 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:21:10.137061 ignition[1296]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem128999820" Apr 12 18:21:10.140018 ignition[1296]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem128999820": device or resource busy Apr 12 18:21:10.140018 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem128999820", trying btrfs: device or resource busy Apr 12 18:21:10.140018 ignition[1296]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem128999820" Apr 12 18:21:10.140018 ignition[1296]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem128999820" Apr 12 18:21:10.152141 ignition[1296]: INFO : op(6): [started] unmounting "/mnt/oem128999820" Apr 12 18:21:10.152141 ignition[1296]: INFO : op(6): [finished] unmounting "/mnt/oem128999820" Apr 12 18:21:10.152141 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:21:10.152141 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:21:10.168395 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:21:10.179684 ignition[1296]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3347847638" Apr 12 18:21:10.179684 ignition[1296]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3347847638": device or resource busy Apr 12 18:21:10.179684 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3347847638", trying btrfs: device or resource busy Apr 12 18:21:10.179684 ignition[1296]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3347847638" Apr 12 18:21:10.191948 ignition[1296]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3347847638" Apr 12 18:21:10.191948 ignition[1296]: INFO : op(9): [started] unmounting "/mnt/oem3347847638" Apr 12 18:21:10.191948 ignition[1296]: INFO : op(9): [finished] unmounting "/mnt/oem3347847638" Apr 12 18:21:10.191948 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:21:10.191948 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:21:10.191948 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:21:10.214972 ignition[1296]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4155939883" Apr 12 18:21:10.217924 ignition[1296]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4155939883": device or resource busy Apr 12 18:21:10.217924 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4155939883", trying btrfs: device or resource busy Apr 12 18:21:10.217924 ignition[1296]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4155939883" Apr 12 18:21:10.227265 ignition[1296]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4155939883" Apr 12 18:21:10.227265 ignition[1296]: INFO : op(c): [started] unmounting "/mnt/oem4155939883" Apr 12 18:21:10.236466 ignition[1296]: INFO : op(c): [finished] unmounting "/mnt/oem4155939883" Apr 12 18:21:10.238796 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:21:10.238796 ignition[1296]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:21:10.238796 ignition[1296]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:21:10.238796 ignition[1296]: INFO : files: op(14): [started] processing unit "amazon-ssm-agent.service" Apr 12 18:21:10.251881 ignition[1296]: INFO : files: op(14): op(15): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:21:10.246832 systemd[1]: mnt-oem4155939883.mount: Deactivated successfully. Apr 12 18:21:10.259129 ignition[1296]: INFO : files: op(14): op(15): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(14): [finished] processing unit "amazon-ssm-agent.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(16): [started] processing unit "nvidia.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(16): [finished] processing unit "nvidia.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:21:10.269265 ignition[1296]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:21:10.330677 ignition[1296]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:21:10.330677 ignition[1296]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:21:10.330677 ignition[1296]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:21:10.330677 ignition[1296]: INFO : files: op(21): [started] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:21:10.330677 ignition[1296]: INFO : files: op(21): [finished] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:21:10.330677 ignition[1296]: INFO : files: op(22): [started] setting preset to enabled for "nvidia.service" Apr 12 18:21:10.330677 ignition[1296]: INFO : files: op(22): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:21:10.330677 ignition[1296]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:21:10.330677 ignition[1296]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:21:10.330677 ignition[1296]: INFO : files: files passed Apr 12 18:21:10.358729 ignition[1296]: INFO : Ignition finished successfully Apr 12 18:21:10.362114 systemd[1]: Finished ignition-files.service. Apr 12 18:21:10.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.372891 kernel: audit: type=1130 audit(1712946070.364:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.380321 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:21:10.384541 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:21:10.392130 systemd[1]: Starting ignition-quench.service... Apr 12 18:21:10.400485 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:21:10.403147 systemd[1]: Finished ignition-quench.service. Apr 12 18:21:10.421047 kernel: audit: type=1130 audit(1712946070.401:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.421088 kernel: audit: type=1131 audit(1712946070.401:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.421560 initrd-setup-root-after-ignition[1321]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:21:10.425497 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:21:10.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.426954 systemd[1]: Reached target ignition-complete.target. Apr 12 18:21:10.428254 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:21:10.448900 kernel: audit: type=1130 audit(1712946070.424:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.466139 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:21:10.487826 kernel: audit: type=1130 audit(1712946070.467:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.487890 kernel: audit: type=1131 audit(1712946070.467:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.466341 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:21:10.468333 systemd[1]: Reached target initrd-fs.target. Apr 12 18:21:10.483879 systemd[1]: Reached target initrd.target. Apr 12 18:21:10.485522 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:21:10.487938 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:21:10.518588 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:21:10.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.523542 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:21:10.533083 kernel: audit: type=1130 audit(1712946070.521:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.546601 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:21:10.550146 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:21:10.554111 systemd[1]: Stopped target timers.target. Apr 12 18:21:10.557536 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:21:10.559924 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:21:10.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.567209 systemd[1]: Stopped target initrd.target. Apr 12 18:21:10.575641 kernel: audit: type=1131 audit(1712946070.562:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.572432 systemd[1]: Stopped target basic.target. Apr 12 18:21:10.574233 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:21:10.577577 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:21:10.580872 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:21:10.582827 systemd[1]: Stopped target remote-fs.target. Apr 12 18:21:10.586262 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:21:10.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.588130 systemd[1]: Stopped target sysinit.target. Apr 12 18:21:10.622698 kernel: audit: type=1131 audit(1712946070.599:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.622734 kernel: audit: type=1131 audit(1712946070.604:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.589929 systemd[1]: Stopped target local-fs.target. Apr 12 18:21:10.593309 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:21:10.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.596758 systemd[1]: Stopped target swap.target. Apr 12 18:21:10.598320 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:21:10.598565 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:21:10.601966 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:21:10.603680 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:21:10.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.603889 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:21:10.605809 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:21:10.606069 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:21:10.626334 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:21:10.628024 systemd[1]: Stopped ignition-files.service. Apr 12 18:21:10.647534 systemd[1]: Stopping ignition-mount.service... Apr 12 18:21:10.653764 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:21:10.666050 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:21:10.667522 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:21:10.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.674593 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:21:10.675344 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:21:10.678417 ignition[1334]: INFO : Ignition 2.14.0 Apr 12 18:21:10.678417 ignition[1334]: INFO : Stage: umount Apr 12 18:21:10.680946 ignition[1334]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:21:10.680946 ignition[1334]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:21:10.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.692151 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:21:10.696995 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:21:10.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.706813 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:21:10.711787 ignition[1334]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:21:10.714456 ignition[1334]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:21:10.719998 ignition[1334]: INFO : PUT result: OK Apr 12 18:21:10.724110 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:21:10.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.724298 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:21:10.730204 ignition[1334]: INFO : umount: umount passed Apr 12 18:21:10.731900 ignition[1334]: INFO : Ignition finished successfully Apr 12 18:21:10.734973 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:21:10.735388 systemd[1]: Stopped ignition-mount.service. Apr 12 18:21:10.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.739130 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:21:10.739216 systemd[1]: Stopped ignition-disks.service. Apr 12 18:21:10.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.741651 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:21:10.741731 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:21:10.743410 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:21:10.743553 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:21:10.746947 systemd[1]: Stopped target network.target. Apr 12 18:21:10.748556 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:21:10.748789 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:21:10.751738 systemd[1]: Stopped target paths.target. Apr 12 18:21:10.753197 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:21:10.756908 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:21:10.771829 systemd[1]: Stopped target slices.target. Apr 12 18:21:10.774730 systemd[1]: Stopped target sockets.target. Apr 12 18:21:10.777677 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:21:10.777751 systemd[1]: Closed iscsid.socket. Apr 12 18:21:10.781984 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:21:10.782056 systemd[1]: Closed iscsiuio.socket. Apr 12 18:21:10.785074 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:21:10.786393 systemd[1]: Stopped ignition-setup.service. Apr 12 18:21:10.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.789725 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:21:10.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.791176 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:21:10.795037 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:21:10.798151 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:21:10.802913 systemd-networkd[1142]: eth0: DHCPv6 lease lost Apr 12 18:21:10.806797 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:21:10.807944 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:21:10.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.818622 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:21:10.819092 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:21:10.821000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:21:10.821000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:21:10.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.825654 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:21:10.825897 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:21:10.842072 systemd[1]: Stopping network-cleanup.service... Apr 12 18:21:10.845568 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:21:10.847554 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:21:10.851483 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:21:10.853116 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:21:10.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.857168 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:21:10.857560 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:21:10.863131 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:21:10.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.872120 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:21:10.872595 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:21:10.878249 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:21:10.880225 systemd[1]: Stopped network-cleanup.service. Apr 12 18:21:10.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.884110 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:21:10.884219 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:21:10.889605 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:21:10.889709 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:21:10.897358 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:21:10.897510 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:21:10.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.903002 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:21:10.903121 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:21:10.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.908029 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:21:10.908128 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:21:10.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.915167 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:21:10.935994 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:21:10.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.936129 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:21:10.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.943627 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:21:10.944251 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:21:10.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:10.946030 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:21:10.946117 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:21:10.951508 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:21:10.951751 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:21:10.953926 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:21:10.957037 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:21:10.973367 systemd[1]: Switching root. Apr 12 18:21:11.006928 iscsid[1147]: iscsid shutting down. Apr 12 18:21:11.010275 systemd-journald[268]: Received SIGTERM from PID 1 (systemd). Apr 12 18:21:11.010372 systemd-journald[268]: Journal stopped Apr 12 18:21:15.322523 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:21:15.322635 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:21:15.322677 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:21:15.322710 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:21:15.322743 kernel: SELinux: policy capability open_perms=1 Apr 12 18:21:15.322778 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:21:15.322811 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:21:15.322843 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:21:15.322893 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:21:15.322942 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:21:15.322975 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:21:15.323011 systemd[1]: Successfully loaded SELinux policy in 69.729ms. Apr 12 18:21:15.323065 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.774ms. Apr 12 18:21:15.323107 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:21:15.323140 systemd[1]: Detected virtualization amazon. Apr 12 18:21:15.323173 systemd[1]: Detected architecture arm64. Apr 12 18:21:15.323206 systemd[1]: Detected first boot. Apr 12 18:21:15.323247 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:21:15.323277 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:21:15.323309 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:21:15.323353 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:21:15.323393 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:21:15.323431 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:21:15.323466 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:21:15.323499 systemd[1]: Stopped iscsiuio.service. Apr 12 18:21:15.323534 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:21:15.323565 systemd[1]: Stopped iscsid.service. Apr 12 18:21:15.323597 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:21:15.323631 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:21:15.324089 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:21:15.324138 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:21:15.324171 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:21:15.324206 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:21:15.324236 systemd[1]: Created slice system-getty.slice. Apr 12 18:21:15.324269 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:21:15.324299 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:21:15.324331 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:21:15.324363 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:21:15.324397 systemd[1]: Created slice user.slice. Apr 12 18:21:15.324427 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:21:15.324457 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:21:15.324489 systemd[1]: Set up automount boot.automount. Apr 12 18:21:15.324521 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:21:15.324551 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:21:15.324583 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:21:15.324613 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:21:15.324649 systemd[1]: Reached target integritysetup.target. Apr 12 18:21:15.324679 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:21:15.324712 systemd[1]: Reached target remote-fs.target. Apr 12 18:21:15.324747 systemd[1]: Reached target slices.target. Apr 12 18:21:15.324781 systemd[1]: Reached target swap.target. Apr 12 18:21:15.324816 systemd[1]: Reached target torcx.target. Apr 12 18:21:15.324846 systemd[1]: Reached target veritysetup.target. Apr 12 18:21:15.324920 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:21:15.324953 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:21:15.324989 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:21:15.325023 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:21:15.325053 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:21:15.325083 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:21:15.325113 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:21:15.325145 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:21:15.325178 systemd[1]: Mounting media.mount... Apr 12 18:21:15.325210 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:21:15.325241 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:21:15.325276 systemd[1]: Mounting tmp.mount... Apr 12 18:21:15.325310 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:21:15.325343 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:21:15.325372 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:21:15.325402 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:21:15.325432 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:21:15.325464 systemd[1]: Starting modprobe@drm.service... Apr 12 18:21:15.325495 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:21:15.325526 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:21:15.325560 systemd[1]: Starting modprobe@loop.service... Apr 12 18:21:15.325595 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:21:15.325636 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:21:15.325665 kernel: loop: module loaded Apr 12 18:21:15.325702 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:21:15.325732 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:21:15.325761 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:21:15.325791 systemd[1]: Stopped systemd-journald.service. Apr 12 18:21:15.325821 systemd[1]: Starting systemd-journald.service... Apr 12 18:21:15.325898 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:21:15.325936 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:21:15.331509 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:21:15.331586 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:21:15.331622 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:21:15.331653 systemd[1]: Stopped verity-setup.service. Apr 12 18:21:15.331684 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:21:15.331715 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:21:15.331745 systemd[1]: Mounted media.mount. Apr 12 18:21:15.331775 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:21:15.331814 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:21:15.331844 systemd[1]: Mounted tmp.mount. Apr 12 18:21:15.331904 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:21:15.331935 kernel: fuse: init (API version 7.34) Apr 12 18:21:15.331968 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:21:15.332000 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:21:15.332032 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:21:15.332068 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:21:15.332099 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:21:15.332129 systemd[1]: Finished modprobe@drm.service. Apr 12 18:21:15.332170 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:21:15.332203 systemd-journald[1457]: Journal started Apr 12 18:21:15.332309 systemd-journald[1457]: Runtime Journal (/run/log/journal/ec2bcdb82ab23dd4cb5188b3ab571e8c) is 8.0M, max 75.4M, 67.4M free. Apr 12 18:21:11.192000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:21:11.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:21:11.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:21:11.286000 audit: BPF prog-id=10 op=LOAD Apr 12 18:21:11.286000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:21:11.286000 audit: BPF prog-id=11 op=LOAD Apr 12 18:21:11.286000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:21:11.404000 audit[1367]: AVC avc: denied { associate } for pid=1367 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:21:11.404000 audit[1367]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1350 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:11.404000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:21:11.407000 audit[1367]: AVC avc: denied { associate } for pid=1367 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:21:11.407000 audit[1367]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1350 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:11.407000 audit: CWD cwd="/" Apr 12 18:21:11.407000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:21:11.407000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:21:11.407000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:21:14.916000 audit: BPF prog-id=12 op=LOAD Apr 12 18:21:14.916000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:21:14.916000 audit: BPF prog-id=13 op=LOAD Apr 12 18:21:15.338025 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:21:14.916000 audit: BPF prog-id=14 op=LOAD Apr 12 18:21:14.917000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:21:14.917000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:21:14.919000 audit: BPF prog-id=15 op=LOAD Apr 12 18:21:14.919000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:21:14.919000 audit: BPF prog-id=16 op=LOAD Apr 12 18:21:14.920000 audit: BPF prog-id=17 op=LOAD Apr 12 18:21:14.920000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:21:14.920000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:21:14.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:14.930000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:21:14.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:14.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:14.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:14.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.219000 audit: BPF prog-id=18 op=LOAD Apr 12 18:21:15.220000 audit: BPF prog-id=19 op=LOAD Apr 12 18:21:15.220000 audit: BPF prog-id=20 op=LOAD Apr 12 18:21:15.220000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:21:15.220000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:21:15.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.343473 systemd[1]: Started systemd-journald.service. Apr 12 18:21:15.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.319000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:21:15.319000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffff6516150 a2=4000 a3=1 items=0 ppid=1 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:15.319000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:21:15.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:14.914352 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:21:11.400228 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:21:15.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:14.924211 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:21:11.401180 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:21:15.344667 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:21:15.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:11.401228 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:21:15.345084 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:21:11.401292 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:21:15.347579 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:21:11.401317 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:21:15.348028 systemd[1]: Finished modprobe@loop.service. Apr 12 18:21:15.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:11.401376 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:21:15.350386 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:21:11.401406 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:21:15.352779 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:21:11.401797 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:21:15.355553 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:21:11.401912 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:21:15.358430 systemd[1]: Reached target network-pre.target. Apr 12 18:21:11.401948 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:21:15.362832 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:21:11.403648 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:21:11.403762 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:21:11.403835 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:21:11.403902 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:21:11.403952 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:21:11.403991 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:21:14.121669 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:21:14.122263 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:21:14.122504 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:21:14.122968 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:21:14.123079 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:21:14.123220 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:21:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:21:15.371701 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:21:15.375035 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:21:15.380245 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:21:15.384651 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:21:15.386542 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:21:15.416526 kernel: kauditd_printk_skb: 95 callbacks suppressed Apr 12 18:21:15.417285 kernel: audit: type=1130 audit(1712946075.404:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.389258 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:21:15.391178 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:21:15.393658 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:21:15.403500 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:21:15.416023 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:21:15.418373 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:21:15.424432 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:21:15.441298 systemd-journald[1457]: Time spent on flushing to /var/log/journal/ec2bcdb82ab23dd4cb5188b3ab571e8c is 104.210ms for 1165 entries. Apr 12 18:21:15.441298 systemd-journald[1457]: System Journal (/var/log/journal/ec2bcdb82ab23dd4cb5188b3ab571e8c) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:21:15.579240 systemd-journald[1457]: Received client request to flush runtime journal. Apr 12 18:21:15.579381 kernel: audit: type=1130 audit(1712946075.449:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.579446 kernel: audit: type=1130 audit(1712946075.494:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.579499 kernel: audit: type=1130 audit(1712946075.513:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.448249 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:21:15.450388 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:21:15.492972 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:21:15.512090 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:21:15.524272 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:21:15.582213 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:21:15.585052 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:21:15.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.605901 kernel: audit: type=1130 audit(1712946075.583:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.606054 kernel: audit: type=1130 audit(1712946075.594:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.664489 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:21:15.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.675902 kernel: audit: type=1130 audit(1712946075.665:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:15.678422 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:21:15.694342 udevadm[1488]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:21:16.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:16.382691 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:21:16.387014 systemd[1]: Starting systemd-udevd.service... Apr 12 18:21:16.401330 kernel: audit: type=1130 audit(1712946076.383:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:16.401477 kernel: audit: type=1334 audit(1712946076.384:141): prog-id=21 op=LOAD Apr 12 18:21:16.401540 kernel: audit: type=1334 audit(1712946076.385:142): prog-id=22 op=LOAD Apr 12 18:21:16.384000 audit: BPF prog-id=21 op=LOAD Apr 12 18:21:16.385000 audit: BPF prog-id=22 op=LOAD Apr 12 18:21:16.385000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:21:16.385000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:21:16.436790 systemd-udevd[1489]: Using default interface naming scheme 'v252'. Apr 12 18:21:16.472371 systemd[1]: Started systemd-udevd.service. Apr 12 18:21:16.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:16.477000 audit: BPF prog-id=23 op=LOAD Apr 12 18:21:16.479445 systemd[1]: Starting systemd-networkd.service... Apr 12 18:21:16.486000 audit: BPF prog-id=24 op=LOAD Apr 12 18:21:16.486000 audit: BPF prog-id=25 op=LOAD Apr 12 18:21:16.486000 audit: BPF prog-id=26 op=LOAD Apr 12 18:21:16.488721 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:21:16.573464 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:21:16.574899 systemd[1]: Started systemd-userdbd.service. Apr 12 18:21:16.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:16.606148 (udev-worker)[1494]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:21:16.715082 systemd-networkd[1498]: lo: Link UP Apr 12 18:21:16.715107 systemd-networkd[1498]: lo: Gained carrier Apr 12 18:21:16.716143 systemd-networkd[1498]: Enumeration completed Apr 12 18:21:16.716349 systemd[1]: Started systemd-networkd.service. Apr 12 18:21:16.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:16.716394 systemd-networkd[1498]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:21:16.720671 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:21:16.727905 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:21:16.729052 systemd-networkd[1498]: eth0: Link UP Apr 12 18:21:16.729359 systemd-networkd[1498]: eth0: Gained carrier Apr 12 18:21:16.743170 systemd-networkd[1498]: eth0: DHCPv4 address 172.31.20.40/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:21:16.840053 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1499) Apr 12 18:21:16.964519 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:21:16.967755 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:21:16.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:16.972471 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:21:16.992533 lvm[1608]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:21:17.034517 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:21:17.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.036669 systemd[1]: Reached target cryptsetup.target. Apr 12 18:21:17.040653 systemd[1]: Starting lvm2-activation.service... Apr 12 18:21:17.049216 lvm[1609]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:21:17.087562 systemd[1]: Finished lvm2-activation.service. Apr 12 18:21:17.089547 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:21:17.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.091348 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:21:17.091405 systemd[1]: Reached target local-fs.target. Apr 12 18:21:17.093104 systemd[1]: Reached target machines.target. Apr 12 18:21:17.097045 systemd[1]: Starting ldconfig.service... Apr 12 18:21:17.100077 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:21:17.100179 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:21:17.102592 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:21:17.106826 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:21:17.112261 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:21:17.114553 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:21:17.114668 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:21:17.118538 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:21:17.126764 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1611 (bootctl) Apr 12 18:21:17.131393 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:21:17.161488 systemd-tmpfiles[1614]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:21:17.166031 systemd-tmpfiles[1614]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:21:17.170654 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:21:17.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.175444 systemd-tmpfiles[1614]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:21:17.251959 systemd-fsck[1620]: fsck.fat 4.2 (2021-01-31) Apr 12 18:21:17.251959 systemd-fsck[1620]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Apr 12 18:21:17.259686 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:21:17.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.264675 systemd[1]: Mounting boot.mount... Apr 12 18:21:17.294659 systemd[1]: Mounted boot.mount. Apr 12 18:21:17.327751 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:21:17.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.663410 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:21:17.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.669100 systemd[1]: Starting audit-rules.service... Apr 12 18:21:17.673149 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:21:17.677522 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:21:17.680000 audit: BPF prog-id=27 op=LOAD Apr 12 18:21:17.687000 audit: BPF prog-id=28 op=LOAD Apr 12 18:21:17.683402 systemd[1]: Starting systemd-resolved.service... Apr 12 18:21:17.691181 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:21:17.695355 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:21:17.722000 audit[1640]: SYSTEM_BOOT pid=1640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.729075 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:21:17.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.742635 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:21:17.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.744934 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:21:17.897256 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:21:17.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.921039 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:21:17.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:17.923213 systemd[1]: Reached target time-set.target. Apr 12 18:21:18.024410 systemd-resolved[1638]: Positive Trust Anchors: Apr 12 18:21:18.024439 systemd-resolved[1638]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:21:18.024492 systemd-resolved[1638]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:21:18.158250 systemd-timesyncd[1639]: Contacted time server 198.60.22.240:123 (0.flatcar.pool.ntp.org). Apr 12 18:21:18.158496 systemd-timesyncd[1639]: Initial clock synchronization to Fri 2024-04-12 18:21:17.957828 UTC. Apr 12 18:21:18.218000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:21:18.218000 audit[1656]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdc2f07b0 a2=420 a3=0 items=0 ppid=1635 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:18.218000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:21:18.220003 augenrules[1656]: No rules Apr 12 18:21:18.221637 systemd[1]: Finished audit-rules.service. Apr 12 18:21:18.265722 systemd-resolved[1638]: Defaulting to hostname 'linux'. Apr 12 18:21:18.270005 systemd[1]: Started systemd-resolved.service. Apr 12 18:21:18.272139 systemd[1]: Reached target network.target. Apr 12 18:21:18.274017 systemd[1]: Reached target nss-lookup.target. Apr 12 18:21:18.317712 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:21:18.318989 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:21:18.324094 ldconfig[1610]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:21:18.331516 systemd[1]: Finished ldconfig.service. Apr 12 18:21:18.336255 systemd[1]: Starting systemd-update-done.service... Apr 12 18:21:18.351339 systemd[1]: Finished systemd-update-done.service. Apr 12 18:21:18.353520 systemd[1]: Reached target sysinit.target. Apr 12 18:21:18.355526 systemd[1]: Started motdgen.path. Apr 12 18:21:18.357316 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:21:18.360236 systemd[1]: Started logrotate.timer. Apr 12 18:21:18.362291 systemd[1]: Started mdadm.timer. Apr 12 18:21:18.364033 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:21:18.366092 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:21:18.366166 systemd[1]: Reached target paths.target. Apr 12 18:21:18.368046 systemd[1]: Reached target timers.target. Apr 12 18:21:18.370559 systemd[1]: Listening on dbus.socket. Apr 12 18:21:18.374476 systemd[1]: Starting docker.socket... Apr 12 18:21:18.381529 systemd[1]: Listening on sshd.socket. Apr 12 18:21:18.383357 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:21:18.384387 systemd[1]: Listening on docker.socket. Apr 12 18:21:18.386419 systemd[1]: Reached target sockets.target. Apr 12 18:21:18.388231 systemd[1]: Reached target basic.target. Apr 12 18:21:18.390019 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:21:18.390077 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:21:18.392403 systemd[1]: Starting containerd.service... Apr 12 18:21:18.397732 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:21:18.410192 systemd[1]: Starting dbus.service... Apr 12 18:21:18.418309 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:21:18.426039 systemd[1]: Starting extend-filesystems.service... Apr 12 18:21:18.428071 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:21:18.430830 systemd[1]: Starting motdgen.service... Apr 12 18:21:18.435065 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:21:18.441125 systemd[1]: Starting prepare-critools.service... Apr 12 18:21:18.445802 systemd[1]: Starting prepare-helm.service... Apr 12 18:21:18.452427 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:21:18.458491 jq[1669]: false Apr 12 18:21:18.456948 systemd[1]: Starting sshd-keygen.service... Apr 12 18:21:18.464244 systemd[1]: Starting systemd-logind.service... Apr 12 18:21:18.466228 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:21:18.466396 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:21:18.467456 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:21:18.470286 systemd[1]: Starting update-engine.service... Apr 12 18:21:18.475377 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:21:18.491499 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:21:18.506059 jq[1679]: true Apr 12 18:21:18.491951 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:21:18.526962 tar[1682]: linux-arm64/helm Apr 12 18:21:18.540528 tar[1688]: ./ Apr 12 18:21:18.540528 tar[1688]: ./loopback Apr 12 18:21:18.545928 tar[1681]: crictl Apr 12 18:21:18.561686 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:21:18.562180 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:21:18.580082 jq[1684]: true Apr 12 18:21:18.583089 dbus-daemon[1667]: [system] SELinux support is enabled Apr 12 18:21:18.589373 systemd[1]: Started dbus.service. Apr 12 18:21:18.594841 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:21:18.595031 systemd[1]: Reached target system-config.target. Apr 12 18:21:18.597078 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:21:18.597140 systemd[1]: Reached target user-config.target. Apr 12 18:21:18.632588 dbus-daemon[1667]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1498 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 18:21:18.641522 dbus-daemon[1667]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:21:18.648625 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:21:18.649080 systemd[1]: Finished motdgen.service. Apr 12 18:21:18.657600 systemd[1]: Starting systemd-hostnamed.service... Apr 12 18:21:18.660910 extend-filesystems[1670]: Found nvme0n1 Apr 12 18:21:18.660910 extend-filesystems[1670]: Found nvme0n1p1 Apr 12 18:21:18.660910 extend-filesystems[1670]: Found nvme0n1p2 Apr 12 18:21:18.660910 extend-filesystems[1670]: Found nvme0n1p3 Apr 12 18:21:18.660910 extend-filesystems[1670]: Found usr Apr 12 18:21:18.660910 extend-filesystems[1670]: Found nvme0n1p4 Apr 12 18:21:18.660910 extend-filesystems[1670]: Found nvme0n1p6 Apr 12 18:21:18.676275 extend-filesystems[1670]: Found nvme0n1p7 Apr 12 18:21:18.676275 extend-filesystems[1670]: Found nvme0n1p9 Apr 12 18:21:18.676275 extend-filesystems[1670]: Checking size of /dev/nvme0n1p9 Apr 12 18:21:18.697060 systemd-networkd[1498]: eth0: Gained IPv6LL Apr 12 18:21:18.699933 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:21:18.702243 systemd[1]: Reached target network-online.target. Apr 12 18:21:18.706158 systemd[1]: Started amazon-ssm-agent.service. Apr 12 18:21:18.710415 systemd[1]: Started nvidia.service. Apr 12 18:21:18.806930 extend-filesystems[1670]: Resized partition /dev/nvme0n1p9 Apr 12 18:21:18.854242 extend-filesystems[1732]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:21:18.885617 update_engine[1678]: I0412 18:21:18.882302 1678 main.cc:92] Flatcar Update Engine starting Apr 12 18:21:18.902896 systemd[1]: Started update-engine.service. Apr 12 18:21:18.907964 systemd[1]: Started locksmithd.service. Apr 12 18:21:18.910637 update_engine[1678]: I0412 18:21:18.910570 1678 update_check_scheduler.cc:74] Next update check in 4m34s Apr 12 18:21:18.917899 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Apr 12 18:21:19.009916 env[1683]: time="2024-04-12T18:21:19.007193711Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:21:19.021932 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Apr 12 18:21:19.049803 bash[1735]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:21:19.025431 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:21:19.057028 extend-filesystems[1732]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 18:21:19.057028 extend-filesystems[1732]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:21:19.057028 extend-filesystems[1732]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Apr 12 18:21:19.074993 extend-filesystems[1670]: Resized filesystem in /dev/nvme0n1p9 Apr 12 18:21:19.088087 tar[1688]: ./bandwidth Apr 12 18:21:19.088709 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:21:19.090147 systemd[1]: Finished extend-filesystems.service. Apr 12 18:21:19.118040 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:21:19.148874 amazon-ssm-agent[1719]: 2024/04/12 18:21:19 Failed to load instance info from vault. RegistrationKey does not exist. Apr 12 18:21:19.170206 env[1683]: time="2024-04-12T18:21:19.170130949Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:21:19.170708 env[1683]: time="2024-04-12T18:21:19.170666560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:21:19.176202 env[1683]: time="2024-04-12T18:21:19.176132722Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:21:19.176401 env[1683]: time="2024-04-12T18:21:19.176364036Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:21:19.177000 env[1683]: time="2024-04-12T18:21:19.176939706Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:21:19.178615 env[1683]: time="2024-04-12T18:21:19.178551100Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:21:19.181532 amazon-ssm-agent[1719]: Initializing new seelog logger Apr 12 18:21:19.181781 amazon-ssm-agent[1719]: New Seelog Logger Creation Complete Apr 12 18:21:19.182137 amazon-ssm-agent[1719]: 2024/04/12 18:21:19 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:21:19.182137 amazon-ssm-agent[1719]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:21:19.182517 amazon-ssm-agent[1719]: 2024/04/12 18:21:19 processing appconfig overrides Apr 12 18:21:19.187810 env[1683]: time="2024-04-12T18:21:19.178844200Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:21:19.189584 env[1683]: time="2024-04-12T18:21:19.189455451Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:21:19.191188 env[1683]: time="2024-04-12T18:21:19.191126642Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:21:19.195346 env[1683]: time="2024-04-12T18:21:19.195292399Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:21:19.196274 systemd-logind[1677]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 18:21:19.197065 env[1683]: time="2024-04-12T18:21:19.196243968Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:21:19.202877 env[1683]: time="2024-04-12T18:21:19.202796221Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:21:19.203322 env[1683]: time="2024-04-12T18:21:19.203271005Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:21:19.204127 env[1683]: time="2024-04-12T18:21:19.204074151Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:21:19.205366 systemd-logind[1677]: New seat seat0. Apr 12 18:21:19.217659 systemd[1]: Started systemd-logind.service. Apr 12 18:21:19.221307 env[1683]: time="2024-04-12T18:21:19.221126661Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:21:19.221908 env[1683]: time="2024-04-12T18:21:19.221812764Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:21:19.223044 env[1683]: time="2024-04-12T18:21:19.222913585Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:21:19.223752 env[1683]: time="2024-04-12T18:21:19.223695871Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.224042 env[1683]: time="2024-04-12T18:21:19.223980395Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.224305 env[1683]: time="2024-04-12T18:21:19.224241976Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.224525 env[1683]: time="2024-04-12T18:21:19.224472190Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.225607 env[1683]: time="2024-04-12T18:21:19.225532998Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.234065 env[1683]: time="2024-04-12T18:21:19.233946375Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.236805 env[1683]: time="2024-04-12T18:21:19.236704008Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.237113 env[1683]: time="2024-04-12T18:21:19.237045755Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.237325 env[1683]: time="2024-04-12T18:21:19.237272307Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:21:19.237907 env[1683]: time="2024-04-12T18:21:19.237828918Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:21:19.240062 env[1683]: time="2024-04-12T18:21:19.239996549Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:21:19.241630 env[1683]: time="2024-04-12T18:21:19.241572376Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:21:19.249507 env[1683]: time="2024-04-12T18:21:19.249444375Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.249733 env[1683]: time="2024-04-12T18:21:19.249692934Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:21:19.250313 env[1683]: time="2024-04-12T18:21:19.250014171Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.250628 env[1683]: time="2024-04-12T18:21:19.250551268Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.250864 env[1683]: time="2024-04-12T18:21:19.250797101Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.251117 env[1683]: time="2024-04-12T18:21:19.251054622Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.251355 env[1683]: time="2024-04-12T18:21:19.251293553Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.251617 env[1683]: time="2024-04-12T18:21:19.251550664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.251897 env[1683]: time="2024-04-12T18:21:19.251794462Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.252188 env[1683]: time="2024-04-12T18:21:19.252118261Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.252429 env[1683]: time="2024-04-12T18:21:19.252375958Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:21:19.253218 env[1683]: time="2024-04-12T18:21:19.253110767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.253502 env[1683]: time="2024-04-12T18:21:19.253436041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.253744 env[1683]: time="2024-04-12T18:21:19.253680809Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.254603 env[1683]: time="2024-04-12T18:21:19.254430875Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:21:19.257076 env[1683]: time="2024-04-12T18:21:19.256996972Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:21:19.257355 env[1683]: time="2024-04-12T18:21:19.257294787Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:21:19.257554 env[1683]: time="2024-04-12T18:21:19.257501263Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:21:19.257792 env[1683]: time="2024-04-12T18:21:19.257751050Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:21:19.258628 env[1683]: time="2024-04-12T18:21:19.258449660Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:21:19.260175 env[1683]: time="2024-04-12T18:21:19.259167587Z" level=info msg="Connect containerd service" Apr 12 18:21:19.260175 env[1683]: time="2024-04-12T18:21:19.259416579Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:21:19.261992 env[1683]: time="2024-04-12T18:21:19.261908852Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:21:19.277616 env[1683]: time="2024-04-12T18:21:19.277553074Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:21:19.278065 env[1683]: time="2024-04-12T18:21:19.278014824Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:21:19.278470 systemd[1]: Started containerd.service. Apr 12 18:21:19.280920 env[1683]: time="2024-04-12T18:21:19.280873952Z" level=info msg="containerd successfully booted in 0.364252s" Apr 12 18:21:19.317844 env[1683]: time="2024-04-12T18:21:19.317664382Z" level=info msg="Start subscribing containerd event" Apr 12 18:21:19.319607 env[1683]: time="2024-04-12T18:21:19.319531671Z" level=info msg="Start recovering state" Apr 12 18:21:19.335090 env[1683]: time="2024-04-12T18:21:19.335024125Z" level=info msg="Start event monitor" Apr 12 18:21:19.335229 env[1683]: time="2024-04-12T18:21:19.335100009Z" level=info msg="Start snapshots syncer" Apr 12 18:21:19.335229 env[1683]: time="2024-04-12T18:21:19.335130475Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:21:19.335229 env[1683]: time="2024-04-12T18:21:19.335150002Z" level=info msg="Start streaming server" Apr 12 18:21:19.379024 dbus-daemon[1667]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 18:21:19.381257 dbus-daemon[1667]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1711 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 18:21:19.379450 systemd[1]: Started systemd-hostnamed.service. Apr 12 18:21:19.387269 systemd[1]: Starting polkit.service... Apr 12 18:21:19.433595 polkitd[1765]: Started polkitd version 121 Apr 12 18:21:19.443125 tar[1688]: ./ptp Apr 12 18:21:19.476884 polkitd[1765]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 18:21:19.477034 polkitd[1765]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 18:21:19.488087 polkitd[1765]: Finished loading, compiling and executing 2 rules Apr 12 18:21:19.489493 dbus-daemon[1667]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 18:21:19.489773 systemd[1]: Started polkit.service. Apr 12 18:21:19.494752 polkitd[1765]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 18:21:19.539047 systemd-hostnamed[1711]: Hostname set to (transient) Apr 12 18:21:19.539211 systemd-resolved[1638]: System hostname changed to 'ip-172-31-20-40'. Apr 12 18:21:19.700131 tar[1688]: ./vlan Apr 12 18:21:19.784048 coreos-metadata[1666]: Apr 12 18:21:19.783 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Apr 12 18:21:19.791256 coreos-metadata[1666]: Apr 12 18:21:19.791 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Apr 12 18:21:19.793301 coreos-metadata[1666]: Apr 12 18:21:19.793 INFO Fetch successful Apr 12 18:21:19.793301 coreos-metadata[1666]: Apr 12 18:21:19.793 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Apr 12 18:21:19.795376 coreos-metadata[1666]: Apr 12 18:21:19.795 INFO Fetch successful Apr 12 18:21:19.798012 unknown[1666]: wrote ssh authorized keys file for user: core Apr 12 18:21:19.835964 update-ssh-keys[1842]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:21:19.836846 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:21:19.924814 tar[1688]: ./host-device Apr 12 18:21:20.153553 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Create new startup processor Apr 12 18:21:20.157342 tar[1688]: ./tuning Apr 12 18:21:20.171780 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [LongRunningPluginsManager] registered plugins: {} Apr 12 18:21:20.171993 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Initializing bookkeeping folders Apr 12 18:21:20.171993 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO removing the completed state files Apr 12 18:21:20.171993 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Initializing bookkeeping folders for long running plugins Apr 12 18:21:20.172181 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Apr 12 18:21:20.172181 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Initializing healthcheck folders for long running plugins Apr 12 18:21:20.172181 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Initializing locations for inventory plugin Apr 12 18:21:20.172181 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Initializing default location for custom inventory Apr 12 18:21:20.172408 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Initializing default location for file inventory Apr 12 18:21:20.172408 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Initializing default location for role inventory Apr 12 18:21:20.172408 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Init the cloudwatchlogs publisher Apr 12 18:21:20.172408 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:updateSsmAgent Apr 12 18:21:20.172601 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:configureDocker Apr 12 18:21:20.172601 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:runDockerAction Apr 12 18:21:20.172601 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:refreshAssociation Apr 12 18:21:20.172601 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:runDocument Apr 12 18:21:20.172601 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:softwareInventory Apr 12 18:21:20.172898 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:runPowerShellScript Apr 12 18:21:20.172898 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:configurePackage Apr 12 18:21:20.172898 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform independent plugin aws:downloadContent Apr 12 18:21:20.172898 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Successfully loaded platform dependent plugin aws:runShellScript Apr 12 18:21:20.172898 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Apr 12 18:21:20.179495 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO OS: linux, Arch: arm64 Apr 12 18:21:20.185671 amazon-ssm-agent[1719]: datastore file /var/lib/amazon/ssm/i-056cb0b25ef318f59/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Apr 12 18:21:20.264832 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] Starting document processing engine... Apr 12 18:21:20.317092 tar[1688]: ./vrf Apr 12 18:21:20.359832 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] [EngineProcessor] Starting Apr 12 18:21:20.426987 tar[1688]: ./sbr Apr 12 18:21:20.454283 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Apr 12 18:21:20.536530 tar[1688]: ./tap Apr 12 18:21:20.548842 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] Starting message polling Apr 12 18:21:20.643539 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] Starting send replies to MDS Apr 12 18:21:20.666107 tar[1688]: ./dhcp Apr 12 18:21:20.738519 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [instanceID=i-056cb0b25ef318f59] Starting association polling Apr 12 18:21:20.833586 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Apr 12 18:21:20.928898 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] [Association] Launching response handler Apr 12 18:21:20.941822 systemd[1]: Finished prepare-critools.service. Apr 12 18:21:20.974738 tar[1688]: ./static Apr 12 18:21:21.024491 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Apr 12 18:21:21.060279 tar[1688]: ./firewall Apr 12 18:21:21.120166 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Apr 12 18:21:21.123942 tar[1682]: linux-arm64/LICENSE Apr 12 18:21:21.124456 tar[1682]: linux-arm64/README.md Apr 12 18:21:21.145517 systemd[1]: Finished prepare-helm.service. Apr 12 18:21:21.152769 tar[1688]: ./macvlan Apr 12 18:21:21.216012 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Apr 12 18:21:21.219279 tar[1688]: ./dummy Apr 12 18:21:21.283238 tar[1688]: ./bridge Apr 12 18:21:21.312124 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] Starting session document processing engine... Apr 12 18:21:21.353415 tar[1688]: ./ipvlan Apr 12 18:21:21.408407 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] [EngineProcessor] Starting Apr 12 18:21:21.415923 tar[1688]: ./portmap Apr 12 18:21:21.476477 tar[1688]: ./host-local Apr 12 18:21:21.504909 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Apr 12 18:21:21.552294 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:21:21.601601 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] listening reply. Apr 12 18:21:21.627284 locksmithd[1741]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:21:21.698544 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [OfflineService] Starting document processing engine... Apr 12 18:21:21.795615 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [OfflineService] [EngineProcessor] Starting Apr 12 18:21:21.892962 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [OfflineService] [EngineProcessor] Initial processing Apr 12 18:21:21.990361 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [OfflineService] Starting message polling Apr 12 18:21:21.994476 sshd_keygen[1705]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:21:22.032502 systemd[1]: Finished sshd-keygen.service. Apr 12 18:21:22.037078 systemd[1]: Starting issuegen.service... Apr 12 18:21:22.048120 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:21:22.048488 systemd[1]: Finished issuegen.service. Apr 12 18:21:22.053263 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:21:22.067172 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:21:22.072096 systemd[1]: Started getty@tty1.service. Apr 12 18:21:22.077184 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:21:22.079448 systemd[1]: Reached target getty.target. Apr 12 18:21:22.081390 systemd[1]: Reached target multi-user.target. Apr 12 18:21:22.086093 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:21:22.088328 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [OfflineService] Starting send replies to MDS Apr 12 18:21:22.102163 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:21:22.102562 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:21:22.104810 systemd[1]: Startup finished in 1.109s (kernel) + 36.521s (initrd) + 10.991s (userspace) = 48.622s. Apr 12 18:21:22.185901 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [LongRunningPluginsManager] starting long running plugin manager Apr 12 18:21:22.284037 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Apr 12 18:21:22.382429 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-056cb0b25ef318f59, requestId: 33e8b4d3-0b01-4891-9e66-c096a015a92f Apr 12 18:21:22.481135 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [HealthCheck] HealthCheck reporting agent health. Apr 12 18:21:22.579709 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Apr 12 18:21:22.678546 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [StartupProcessor] Executing startup processor tasks Apr 12 18:21:22.777686 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Apr 12 18:21:22.876767 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Apr 12 18:21:22.976240 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.3 Apr 12 18:21:23.075933 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-056cb0b25ef318f59?role=subscribe&stream=input Apr 12 18:21:23.175784 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-056cb0b25ef318f59?role=subscribe&stream=input Apr 12 18:21:23.275768 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] Starting receiving message from control channel Apr 12 18:21:23.376111 amazon-ssm-agent[1719]: 2024-04-12 18:21:20 INFO [MessageGatewayService] [EngineProcessor] Initial processing Apr 12 18:21:27.818192 systemd[1]: Created slice system-sshd.slice. Apr 12 18:21:27.820881 systemd[1]: Started sshd@0-172.31.20.40:22-139.178.89.65:38618.service. Apr 12 18:21:28.010315 sshd[1881]: Accepted publickey for core from 139.178.89.65 port 38618 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:21:28.014762 sshd[1881]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:21:28.034824 systemd[1]: Created slice user-500.slice. Apr 12 18:21:28.037747 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:21:28.047080 systemd-logind[1677]: New session 1 of user core. Apr 12 18:21:28.057406 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:21:28.062288 systemd[1]: Starting user@500.service... Apr 12 18:21:28.072074 (systemd)[1884]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:21:28.255158 systemd[1884]: Queued start job for default target default.target. Apr 12 18:21:28.257795 systemd[1884]: Reached target paths.target. Apr 12 18:21:28.258134 systemd[1884]: Reached target sockets.target. Apr 12 18:21:28.258322 systemd[1884]: Reached target timers.target. Apr 12 18:21:28.258479 systemd[1884]: Reached target basic.target. Apr 12 18:21:28.258751 systemd[1884]: Reached target default.target. Apr 12 18:21:28.258911 systemd[1]: Started user@500.service. Apr 12 18:21:28.259666 systemd[1884]: Startup finished in 174ms. Apr 12 18:21:28.261991 systemd[1]: Started session-1.scope. Apr 12 18:21:28.412439 systemd[1]: Started sshd@1-172.31.20.40:22-139.178.89.65:38630.service. Apr 12 18:21:28.592837 sshd[1893]: Accepted publickey for core from 139.178.89.65 port 38630 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:21:28.595897 sshd[1893]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:21:28.603895 systemd-logind[1677]: New session 2 of user core. Apr 12 18:21:28.604837 systemd[1]: Started session-2.scope. Apr 12 18:21:28.738372 sshd[1893]: pam_unix(sshd:session): session closed for user core Apr 12 18:21:28.743737 systemd-logind[1677]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:21:28.745101 systemd[1]: sshd@1-172.31.20.40:22-139.178.89.65:38630.service: Deactivated successfully. Apr 12 18:21:28.746524 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:21:28.748072 systemd-logind[1677]: Removed session 2. Apr 12 18:21:28.767350 systemd[1]: Started sshd@2-172.31.20.40:22-139.178.89.65:38634.service. Apr 12 18:21:28.943935 sshd[1899]: Accepted publickey for core from 139.178.89.65 port 38634 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:21:28.946299 sshd[1899]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:21:28.955046 systemd[1]: Started session-3.scope. Apr 12 18:21:28.955954 systemd-logind[1677]: New session 3 of user core. Apr 12 18:21:29.078720 sshd[1899]: pam_unix(sshd:session): session closed for user core Apr 12 18:21:29.084348 systemd-logind[1677]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:21:29.084982 systemd[1]: sshd@2-172.31.20.40:22-139.178.89.65:38634.service: Deactivated successfully. Apr 12 18:21:29.086346 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:21:29.088551 systemd-logind[1677]: Removed session 3. Apr 12 18:21:29.108321 systemd[1]: Started sshd@3-172.31.20.40:22-139.178.89.65:38642.service. Apr 12 18:21:29.286569 sshd[1905]: Accepted publickey for core from 139.178.89.65 port 38642 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:21:29.289417 sshd[1905]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:21:29.298980 systemd-logind[1677]: New session 4 of user core. Apr 12 18:21:29.300323 systemd[1]: Started session-4.scope. Apr 12 18:21:29.439296 sshd[1905]: pam_unix(sshd:session): session closed for user core Apr 12 18:21:29.443981 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:21:29.445395 systemd-logind[1677]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:21:29.445798 systemd[1]: sshd@3-172.31.20.40:22-139.178.89.65:38642.service: Deactivated successfully. Apr 12 18:21:29.448493 systemd-logind[1677]: Removed session 4. Apr 12 18:21:29.467956 systemd[1]: Started sshd@4-172.31.20.40:22-139.178.89.65:38656.service. Apr 12 18:21:29.640969 sshd[1911]: Accepted publickey for core from 139.178.89.65 port 38656 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:21:29.644018 sshd[1911]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:21:29.651938 systemd-logind[1677]: New session 5 of user core. Apr 12 18:21:29.652809 systemd[1]: Started session-5.scope. Apr 12 18:21:29.773638 sudo[1914]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:21:29.775025 sudo[1914]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:21:29.788177 dbus-daemon[1667]: avc: received setenforce notice (enforcing=1) Apr 12 18:21:29.791987 sudo[1914]: pam_unix(sudo:session): session closed for user root Apr 12 18:21:29.816636 sshd[1911]: pam_unix(sshd:session): session closed for user core Apr 12 18:21:29.822911 systemd-logind[1677]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:21:29.823391 systemd[1]: sshd@4-172.31.20.40:22-139.178.89.65:38656.service: Deactivated successfully. Apr 12 18:21:29.824665 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:21:29.826330 systemd-logind[1677]: Removed session 5. Apr 12 18:21:29.845898 systemd[1]: Started sshd@5-172.31.20.40:22-139.178.89.65:38672.service. Apr 12 18:21:30.027825 sshd[1918]: Accepted publickey for core from 139.178.89.65 port 38672 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:21:30.030521 sshd[1918]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:21:30.039380 systemd-logind[1677]: New session 6 of user core. Apr 12 18:21:30.040314 systemd[1]: Started session-6.scope. Apr 12 18:21:30.157097 sudo[1922]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:21:30.157638 sudo[1922]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:21:30.167580 sudo[1922]: pam_unix(sudo:session): session closed for user root Apr 12 18:21:30.177665 sudo[1921]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:21:30.178822 sudo[1921]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:21:30.182962 amazon-ssm-agent[1719]: 2024-04-12 18:21:30 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Apr 12 18:21:30.200539 systemd[1]: Stopping audit-rules.service... Apr 12 18:21:30.201000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:21:30.204724 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 18:21:30.204910 kernel: audit: type=1305 audit(1712946090.201:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:21:30.205187 auditctl[1925]: No rules Apr 12 18:21:30.206437 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:21:30.206838 systemd[1]: Stopped audit-rules.service. Apr 12 18:21:30.211741 systemd[1]: Starting audit-rules.service... Apr 12 18:21:30.225182 kernel: audit: type=1300 audit(1712946090.201:167): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc3ba4910 a2=420 a3=0 items=0 ppid=1 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:30.201000 audit[1925]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc3ba4910 a2=420 a3=0 items=0 ppid=1 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:30.201000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:21:30.229056 kernel: audit: type=1327 audit(1712946090.201:167): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:21:30.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.237396 kernel: audit: type=1131 audit(1712946090.204:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.252489 augenrules[1942]: No rules Apr 12 18:21:30.254402 systemd[1]: Finished audit-rules.service. Apr 12 18:21:30.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.262000 audit[1921]: USER_END pid=1921 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.263559 sudo[1921]: pam_unix(sudo:session): session closed for user root Apr 12 18:21:30.273373 kernel: audit: type=1130 audit(1712946090.253:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.273493 kernel: audit: type=1106 audit(1712946090.262:170): pid=1921 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.273579 kernel: audit: type=1104 audit(1712946090.262:171): pid=1921 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.262000 audit[1921]: CRED_DISP pid=1921 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.288019 sshd[1918]: pam_unix(sshd:session): session closed for user core Apr 12 18:21:30.289000 audit[1918]: USER_END pid=1918 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:21:30.291000 audit[1918]: CRED_DISP pid=1918 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:21:30.303503 systemd[1]: sshd@5-172.31.20.40:22-139.178.89.65:38672.service: Deactivated successfully. Apr 12 18:21:30.304841 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:21:30.311965 kernel: audit: type=1106 audit(1712946090.289:172): pid=1918 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:21:30.312107 kernel: audit: type=1104 audit(1712946090.291:173): pid=1918 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:21:30.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.20.40:22-139.178.89.65:38672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.313133 systemd-logind[1677]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:21:30.324910 kernel: audit: type=1131 audit(1712946090.303:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.20.40:22-139.178.89.65:38672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.321545 systemd[1]: Started sshd@6-172.31.20.40:22-139.178.89.65:38684.service. Apr 12 18:21:30.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.40:22-139.178.89.65:38684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.327306 systemd-logind[1677]: Removed session 6. Apr 12 18:21:30.490000 audit[1948]: USER_ACCT pid=1948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:21:30.491402 sshd[1948]: Accepted publickey for core from 139.178.89.65 port 38684 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:21:30.492000 audit[1948]: CRED_ACQ pid=1948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:21:30.492000 audit[1948]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd8963ef0 a2=3 a3=1 items=0 ppid=1 pid=1948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:30.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:21:30.494493 sshd[1948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:21:30.503552 systemd[1]: Started session-7.scope. Apr 12 18:21:30.504332 systemd-logind[1677]: New session 7 of user core. Apr 12 18:21:30.512000 audit[1948]: USER_START pid=1948 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:21:30.515000 audit[1950]: CRED_ACQ pid=1950 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:21:30.606000 audit[1951]: USER_ACCT pid=1951 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.609190 sudo[1951]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:21:30.608000 audit[1951]: CRED_REFR pid=1951 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:21:30.610281 sudo[1951]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:21:30.613000 audit[1951]: USER_START pid=1951 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:21:31.318576 systemd[1]: Starting docker.service... Apr 12 18:21:31.396183 env[1966]: time="2024-04-12T18:21:31.396073472Z" level=info msg="Starting up" Apr 12 18:21:31.399753 env[1966]: time="2024-04-12T18:21:31.399694593Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:21:31.400091 env[1966]: time="2024-04-12T18:21:31.400045054Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:21:31.400292 env[1966]: time="2024-04-12T18:21:31.400247333Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:21:31.400441 env[1966]: time="2024-04-12T18:21:31.400406451Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:21:31.404274 env[1966]: time="2024-04-12T18:21:31.404224466Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:21:31.404500 env[1966]: time="2024-04-12T18:21:31.404464056Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:21:31.404654 env[1966]: time="2024-04-12T18:21:31.404614971Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:21:31.404812 env[1966]: time="2024-04-12T18:21:31.404778710Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:21:31.419963 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3444840278-merged.mount: Deactivated successfully. Apr 12 18:21:31.467065 env[1966]: time="2024-04-12T18:21:31.466999703Z" level=info msg="Loading containers: start." Apr 12 18:21:31.565000 audit[1997]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.565000 audit[1997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff7ccad90 a2=0 a3=1 items=0 ppid=1966 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.565000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:21:31.570000 audit[1999]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.570000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffffd873db0 a2=0 a3=1 items=0 ppid=1966 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:21:31.576000 audit[2001]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.576000 audit[2001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd76b28f0 a2=0 a3=1 items=0 ppid=1966 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:21:31.580000 audit[2003]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.580000 audit[2003]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe7575be0 a2=0 a3=1 items=0 ppid=1966 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.580000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:21:31.588000 audit[2005]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.588000 audit[2005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd9b56bf0 a2=0 a3=1 items=0 ppid=1966 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:21:31.615000 audit[2010]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.615000 audit[2010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcf923d10 a2=0 a3=1 items=0 ppid=1966 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.615000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:21:31.628000 audit[2012]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2012 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.628000 audit[2012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdc0a7e20 a2=0 a3=1 items=0 ppid=1966 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.628000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:21:31.633000 audit[2014]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.633000 audit[2014]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffcf6e26b0 a2=0 a3=1 items=0 ppid=1966 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.633000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:21:31.638000 audit[2016]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.638000 audit[2016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffcea97ee0 a2=0 a3=1 items=0 ppid=1966 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:21:31.654000 audit[2020]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2020 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.654000 audit[2020]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd995f020 a2=0 a3=1 items=0 ppid=1966 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:21:31.657000 audit[2021]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2021 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.657000 audit[2021]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffefe150f0 a2=0 a3=1 items=0 ppid=1966 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:21:31.674885 kernel: Initializing XFRM netlink socket Apr 12 18:21:31.720265 env[1966]: time="2024-04-12T18:21:31.720174196Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:21:31.725324 (udev-worker)[1977]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:21:31.755000 audit[2029]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2029 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.755000 audit[2029]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe3cd9e30 a2=0 a3=1 items=0 ppid=1966 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:21:31.778000 audit[2032]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2032 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.778000 audit[2032]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffda2b0f50 a2=0 a3=1 items=0 ppid=1966 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.778000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:21:31.785000 audit[2035]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.785000 audit[2035]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd4866320 a2=0 a3=1 items=0 ppid=1966 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:21:31.790000 audit[2037]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2037 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.790000 audit[2037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc8b259c0 a2=0 a3=1 items=0 ppid=1966 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:21:31.795000 audit[2039]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.795000 audit[2039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffffa4683f0 a2=0 a3=1 items=0 ppid=1966 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.795000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:21:31.800000 audit[2041]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.800000 audit[2041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffdb8ad1b0 a2=0 a3=1 items=0 ppid=1966 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:21:31.805000 audit[2043]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2043 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.805000 audit[2043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffc17497d0 a2=0 a3=1 items=0 ppid=1966 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.805000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:21:31.822000 audit[2046]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.822000 audit[2046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe4d7dac0 a2=0 a3=1 items=0 ppid=1966 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:21:31.829000 audit[2048]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2048 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.829000 audit[2048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc0fab2f0 a2=0 a3=1 items=0 ppid=1966 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:21:31.834000 audit[2050]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2050 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.834000 audit[2050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffd2cc3ad0 a2=0 a3=1 items=0 ppid=1966 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:21:31.839000 audit[2052]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.839000 audit[2052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdca3c6e0 a2=0 a3=1 items=0 ppid=1966 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.839000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:21:31.841171 systemd-networkd[1498]: docker0: Link UP Apr 12 18:21:31.859000 audit[2056]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.859000 audit[2056]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc1f5c7f0 a2=0 a3=1 items=0 ppid=1966 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:21:31.862000 audit[2057]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:31.862000 audit[2057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe4c56b90 a2=0 a3=1 items=0 ppid=1966 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:31.862000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:21:31.864246 env[1966]: time="2024-04-12T18:21:31.864184030Z" level=info msg="Loading containers: done." Apr 12 18:21:31.887001 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4113544738-merged.mount: Deactivated successfully. Apr 12 18:21:31.906357 env[1966]: time="2024-04-12T18:21:31.906275684Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:21:31.906663 env[1966]: time="2024-04-12T18:21:31.906607865Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:21:31.906897 env[1966]: time="2024-04-12T18:21:31.906830477Z" level=info msg="Daemon has completed initialization" Apr 12 18:21:31.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:31.936337 systemd[1]: Started docker.service. Apr 12 18:21:31.953844 env[1966]: time="2024-04-12T18:21:31.953458821Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:21:31.989774 systemd[1]: Reloading. Apr 12 18:21:32.116056 /usr/lib/systemd/system-generators/torcx-generator[2104]: time="2024-04-12T18:21:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:21:32.118610 /usr/lib/systemd/system-generators/torcx-generator[2104]: time="2024-04-12T18:21:32Z" level=info msg="torcx already run" Apr 12 18:21:32.299000 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:21:32.299258 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:21:32.342262 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.500000 audit: BPF prog-id=37 op=LOAD Apr 12 18:21:32.500000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:21:32.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit: BPF prog-id=38 op=LOAD Apr 12 18:21:32.502000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit: BPF prog-id=39 op=LOAD Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.503000 audit: BPF prog-id=40 op=LOAD Apr 12 18:21:32.503000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:21:32.503000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:21:32.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.506000 audit: BPF prog-id=41 op=LOAD Apr 12 18:21:32.506000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.507000 audit: BPF prog-id=42 op=LOAD Apr 12 18:21:32.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.508000 audit: BPF prog-id=43 op=LOAD Apr 12 18:21:32.508000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:21:32.508000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit: BPF prog-id=44 op=LOAD Apr 12 18:21:32.509000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit: BPF prog-id=45 op=LOAD Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.510000 audit: BPF prog-id=46 op=LOAD Apr 12 18:21:32.510000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:21:32.510000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit: BPF prog-id=47 op=LOAD Apr 12 18:21:32.511000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit: BPF prog-id=48 op=LOAD Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit: BPF prog-id=49 op=LOAD Apr 12 18:21:32.512000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:21:32.512000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.513000 audit: BPF prog-id=50 op=LOAD Apr 12 18:21:32.513000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit: BPF prog-id=51 op=LOAD Apr 12 18:21:32.515000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit: BPF prog-id=52 op=LOAD Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.516000 audit: BPF prog-id=53 op=LOAD Apr 12 18:21:32.516000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:21:32.516000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:32.524000 audit: BPF prog-id=54 op=LOAD Apr 12 18:21:32.524000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:21:32.564261 systemd[1]: Started kubelet.service. Apr 12 18:21:32.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:32.694553 kubelet[2159]: E0412 18:21:32.694452 2159 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:21:32.698937 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:21:32.699265 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:21:32.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:21:33.162577 env[1683]: time="2024-04-12T18:21:33.162512528Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\"" Apr 12 18:21:33.855210 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2508297296.mount: Deactivated successfully. Apr 12 18:21:36.084186 env[1683]: time="2024-04-12T18:21:36.084127578Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:36.086743 env[1683]: time="2024-04-12T18:21:36.086694252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:883d43b86efe04c7ca7bcd566f873179fa9c1dbceb67e32cd5d30213c3bc17de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:36.089802 env[1683]: time="2024-04-12T18:21:36.089754359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:36.092817 env[1683]: time="2024-04-12T18:21:36.092770899Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:7e7f3c806333528451a1e0bfdf17da0341adaea7d50a703db9c2005c474a97b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:36.094380 env[1683]: time="2024-04-12T18:21:36.094314166Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\" returns image reference \"sha256:883d43b86efe04c7ca7bcd566f873179fa9c1dbceb67e32cd5d30213c3bc17de\"" Apr 12 18:21:36.110926 env[1683]: time="2024-04-12T18:21:36.110821270Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\"" Apr 12 18:21:39.087716 env[1683]: time="2024-04-12T18:21:39.087655950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:39.090252 env[1683]: time="2024-04-12T18:21:39.090204109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7beedd93d8e53aab4b98613d37758450bbbac01a94f42cdb7670da900d1e11d8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:39.093542 env[1683]: time="2024-04-12T18:21:39.093492355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:39.097270 env[1683]: time="2024-04-12T18:21:39.097221233Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:f3d0e8da9d1532e081e719a985e89a0cfe1a29d127773ad8e2c2fee1dd10fd00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:39.098709 env[1683]: time="2024-04-12T18:21:39.098660655Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\" returns image reference \"sha256:7beedd93d8e53aab4b98613d37758450bbbac01a94f42cdb7670da900d1e11d8\"" Apr 12 18:21:39.118459 env[1683]: time="2024-04-12T18:21:39.118408329Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\"" Apr 12 18:21:41.011803 env[1683]: time="2024-04-12T18:21:41.011743194Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:41.014595 env[1683]: time="2024-04-12T18:21:41.014544354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:36dcd04414a4b2b645ad6da4fd60a5d1479f6eb9da01a928082abb025958a687,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:41.017648 env[1683]: time="2024-04-12T18:21:41.017599445Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:41.020739 env[1683]: time="2024-04-12T18:21:41.020674669Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:4d61604f259d3c91d8b3ec7a6a999f5eae9aff371567151cd5165eaa698c6d7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:41.022509 env[1683]: time="2024-04-12T18:21:41.022461245Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\" returns image reference \"sha256:36dcd04414a4b2b645ad6da4fd60a5d1479f6eb9da01a928082abb025958a687\"" Apr 12 18:21:41.038779 env[1683]: time="2024-04-12T18:21:41.038722846Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:21:42.439353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2156368231.mount: Deactivated successfully. Apr 12 18:21:42.922922 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:21:42.923304 systemd[1]: Stopped kubelet.service. Apr 12 18:21:42.944470 kernel: kauditd_printk_skb: 292 callbacks suppressed Apr 12 18:21:42.944612 kernel: audit: type=1130 audit(1712946102.922:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:42.944659 kernel: audit: type=1131 audit(1712946102.922:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:42.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:42.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:42.926545 systemd[1]: Started kubelet.service. Apr 12 18:21:42.957369 kernel: audit: type=1130 audit(1712946102.925:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:42.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:43.061760 kubelet[2194]: E0412 18:21:43.061699 2194 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:21:43.069270 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:21:43.069588 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:21:43.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:21:43.078908 kernel: audit: type=1131 audit(1712946103.069:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:21:43.299984 env[1683]: time="2024-04-12T18:21:43.298958127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:43.303899 env[1683]: time="2024-04-12T18:21:43.303822411Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:43.308114 env[1683]: time="2024-04-12T18:21:43.307938595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:43.312310 env[1683]: time="2024-04-12T18:21:43.312225761Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:43.313391 env[1683]: time="2024-04-12T18:21:43.313346838Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b\"" Apr 12 18:21:43.330777 env[1683]: time="2024-04-12T18:21:43.330725958Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:21:43.804617 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2323039832.mount: Deactivated successfully. Apr 12 18:21:43.814012 env[1683]: time="2024-04-12T18:21:43.813944624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:43.817958 env[1683]: time="2024-04-12T18:21:43.817894490Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:43.820888 env[1683]: time="2024-04-12T18:21:43.820809963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:43.823789 env[1683]: time="2024-04-12T18:21:43.823738922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:43.824814 env[1683]: time="2024-04-12T18:21:43.824769970Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 18:21:43.840331 env[1683]: time="2024-04-12T18:21:43.840266763Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Apr 12 18:21:44.447314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3002711444.mount: Deactivated successfully. Apr 12 18:21:49.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:49.572949 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 18:21:49.582893 kernel: audit: type=1131 audit(1712946109.572:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:49.602000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:21:49.602000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:21:49.607951 kernel: audit: type=1334 audit(1712946109.602:422): prog-id=46 op=UNLOAD Apr 12 18:21:49.608035 kernel: audit: type=1334 audit(1712946109.602:423): prog-id=45 op=UNLOAD Apr 12 18:21:49.608087 kernel: audit: type=1334 audit(1712946109.602:424): prog-id=44 op=UNLOAD Apr 12 18:21:49.602000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:21:49.882531 env[1683]: time="2024-04-12T18:21:49.882393093Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:49.885395 env[1683]: time="2024-04-12T18:21:49.885346542Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:49.888818 env[1683]: time="2024-04-12T18:21:49.888753373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:49.892548 env[1683]: time="2024-04-12T18:21:49.892497838Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:49.894320 env[1683]: time="2024-04-12T18:21:49.894275332Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Apr 12 18:21:49.912430 env[1683]: time="2024-04-12T18:21:49.912356261Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:21:50.386460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3346060729.mount: Deactivated successfully. Apr 12 18:21:51.301092 env[1683]: time="2024-04-12T18:21:51.301034934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:51.305096 env[1683]: time="2024-04-12T18:21:51.305034458Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:51.307974 env[1683]: time="2024-04-12T18:21:51.307929679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:51.311376 env[1683]: time="2024-04-12T18:21:51.311327690Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:21:51.312924 env[1683]: time="2024-04-12T18:21:51.312840511Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Apr 12 18:21:53.172794 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 18:21:53.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.173174 systemd[1]: Stopped kubelet.service. Apr 12 18:21:53.187308 systemd[1]: Started kubelet.service. Apr 12 18:21:53.200381 kernel: audit: type=1130 audit(1712946113.172:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.200529 kernel: audit: type=1131 audit(1712946113.172:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.211246 kernel: audit: type=1130 audit(1712946113.186:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:53.307915 kubelet[2278]: E0412 18:21:53.307823 2278 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:21:53.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:21:53.312186 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:21:53.312494 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:21:53.321884 kernel: audit: type=1131 audit(1712946113.312:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:21:58.097317 systemd[1]: Stopped kubelet.service. Apr 12 18:21:58.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:58.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:58.113652 kernel: audit: type=1130 audit(1712946118.097:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:58.113798 kernel: audit: type=1131 audit(1712946118.101:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:58.134419 systemd[1]: Reloading. Apr 12 18:21:58.268194 /usr/lib/systemd/system-generators/torcx-generator[2311]: time="2024-04-12T18:21:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:21:58.268258 /usr/lib/systemd/system-generators/torcx-generator[2311]: time="2024-04-12T18:21:58Z" level=info msg="torcx already run" Apr 12 18:21:58.429734 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:21:58.430020 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:21:58.472730 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:21:58.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.634975 kernel: audit: type=1400 audit(1712946118.617:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.635105 kernel: audit: type=1400 audit(1712946118.624:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.642424 kernel: audit: type=1400 audit(1712946118.624:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.642505 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.651721 kernel: audit: type=1400 audit(1712946118.624:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.651773 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:21:58.651831 kernel: audit: backlog limit exceeded Apr 12 18:21:58.651896 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.624000 audit: BPF prog-id=55 op=LOAD Apr 12 18:21:58.624000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit: BPF prog-id=56 op=LOAD Apr 12 18:21:58.626000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit: BPF prog-id=57 op=LOAD Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.626000 audit: BPF prog-id=58 op=LOAD Apr 12 18:21:58.626000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:21:58.627000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.634000 audit: BPF prog-id=59 op=LOAD Apr 12 18:21:58.634000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:21:58.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.641000 audit: BPF prog-id=60 op=LOAD Apr 12 18:21:58.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.657000 audit: BPF prog-id=61 op=LOAD Apr 12 18:21:58.657000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:21:58.657000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit: BPF prog-id=62 op=LOAD Apr 12 18:21:58.658000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit: BPF prog-id=63 op=LOAD Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.658000 audit: BPF prog-id=64 op=LOAD Apr 12 18:21:58.658000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:21:58.658000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.660000 audit: BPF prog-id=65 op=LOAD Apr 12 18:21:58.660000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit: BPF prog-id=66 op=LOAD Apr 12 18:21:58.662000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit: BPF prog-id=67 op=LOAD Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.662000 audit: BPF prog-id=68 op=LOAD Apr 12 18:21:58.662000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:21:58.662000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:58.670000 audit: BPF prog-id=69 op=LOAD Apr 12 18:21:58.670000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:21:58.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:21:58.704016 systemd[1]: Started kubelet.service. Apr 12 18:21:58.798041 kubelet[2364]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:21:58.798041 kubelet[2364]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:21:58.798041 kubelet[2364]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:21:58.798647 kubelet[2364]: I0412 18:21:58.798128 2364 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:21:59.595632 kubelet[2364]: I0412 18:21:59.595586 2364 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:21:59.595951 kubelet[2364]: I0412 18:21:59.595928 2364 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:21:59.596439 kubelet[2364]: I0412 18:21:59.596415 2364 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:21:59.606708 kubelet[2364]: E0412 18:21:59.606667 2364 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.20.40:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.607381 kubelet[2364]: I0412 18:21:59.606788 2364 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:21:59.617127 kubelet[2364]: W0412 18:21:59.617073 2364 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:21:59.618379 kubelet[2364]: I0412 18:21:59.618332 2364 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:21:59.618884 kubelet[2364]: I0412 18:21:59.618833 2364 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:21:59.619188 kubelet[2364]: I0412 18:21:59.619140 2364 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:21:59.619360 kubelet[2364]: I0412 18:21:59.619191 2364 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:21:59.619360 kubelet[2364]: I0412 18:21:59.619213 2364 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:21:59.619476 kubelet[2364]: I0412 18:21:59.619370 2364 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:21:59.619597 kubelet[2364]: I0412 18:21:59.619570 2364 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:21:59.620357 kubelet[2364]: W0412 18:21:59.620291 2364 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.20.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-20-40&limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.620494 kubelet[2364]: E0412 18:21:59.620396 2364 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.20.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-20-40&limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.620494 kubelet[2364]: I0412 18:21:59.620446 2364 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:21:59.620606 kubelet[2364]: I0412 18:21:59.620494 2364 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:21:59.620606 kubelet[2364]: I0412 18:21:59.620528 2364 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:21:59.621924 kubelet[2364]: W0412 18:21:59.621532 2364 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.20.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.621924 kubelet[2364]: E0412 18:21:59.621666 2364 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.20.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.622353 kubelet[2364]: I0412 18:21:59.622324 2364 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:21:59.623000 kubelet[2364]: W0412 18:21:59.622974 2364 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:21:59.624120 kubelet[2364]: I0412 18:21:59.624085 2364 server.go:1232] "Started kubelet" Apr 12 18:21:59.626000 audit[2364]: AVC avc: denied { mac_admin } for pid=2364 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:59.626000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:21:59.626000 audit[2364]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400056e210 a1=4000cab830 a2=400056e1e0 a3=25 items=0 ppid=1 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.626000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:21:59.627806 kubelet[2364]: I0412 18:21:59.627774 2364 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:21:59.627000 audit[2364]: AVC avc: denied { mac_admin } for pid=2364 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:59.627000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:21:59.627000 audit[2364]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d19fa0 a1=4000cab848 a2=400056e2a0 a3=25 items=0 ppid=1 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.627000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:21:59.628477 kubelet[2364]: I0412 18:21:59.628450 2364 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:21:59.628737 kubelet[2364]: I0412 18:21:59.628712 2364 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:21:59.630583 kubelet[2364]: E0412 18:21:59.630546 2364 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:21:59.630785 kubelet[2364]: E0412 18:21:59.630762 2364 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:21:59.631467 kubelet[2364]: E0412 18:21:59.631310 2364 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-20-40.17c59b6b939345f8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-20-40", UID:"ip-172-31-20-40", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-20-40"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 21, 59, 624050168, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 21, 59, 624050168, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-20-40"}': 'Post "https://172.31.20.40:6443/api/v1/namespaces/default/events": dial tcp 172.31.20.40:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:21:59.635507 kubelet[2364]: I0412 18:21:59.635425 2364 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:21:59.634000 audit[2375]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:59.634000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcbca6790 a2=0 a3=1 items=0 ppid=2364 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:21:59.637173 kubelet[2364]: I0412 18:21:59.637133 2364 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:21:59.636000 audit[2376]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:59.636000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef6b1a00 a2=0 a3=1 items=0 ppid=2364 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:21:59.639096 kubelet[2364]: I0412 18:21:59.639060 2364 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:21:59.641921 kubelet[2364]: I0412 18:21:59.639283 2364 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:21:59.642079 kubelet[2364]: I0412 18:21:59.641998 2364 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:21:59.642079 kubelet[2364]: I0412 18:21:59.639885 2364 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:21:59.642322 kubelet[2364]: W0412 18:21:59.642261 2364 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.20.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.642458 kubelet[2364]: E0412 18:21:59.642436 2364 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.20.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.642585 kubelet[2364]: I0412 18:21:59.642318 2364 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:21:59.642847 kubelet[2364]: E0412 18:21:59.642821 2364 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-40?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" interval="200ms" Apr 12 18:21:59.652000 audit[2378]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:59.652000 audit[2378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd7d46d20 a2=0 a3=1 items=0 ppid=2364 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:21:59.660000 audit[2380]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:59.660000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdb4a7380 a2=0 a3=1 items=0 ppid=2364 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:21:59.681000 audit[2385]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:59.681000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffca7ff380 a2=0 a3=1 items=0 ppid=2364 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:21:59.685628 kubelet[2364]: I0412 18:21:59.685569 2364 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:21:59.686000 audit[2387]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:21:59.686000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc485d3a0 a2=0 a3=1 items=0 ppid=2364 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:21:59.688446 kubelet[2364]: I0412 18:21:59.688383 2364 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:21:59.688446 kubelet[2364]: I0412 18:21:59.688451 2364 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:21:59.688665 kubelet[2364]: I0412 18:21:59.688489 2364 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:21:59.688665 kubelet[2364]: E0412 18:21:59.688591 2364 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:21:59.690000 audit[2388]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:59.690000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffebc2ce80 a2=0 a3=1 items=0 ppid=2364 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:21:59.694000 audit[2389]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:59.694000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee5523f0 a2=0 a3=1 items=0 ppid=2364 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:21:59.698000 audit[2390]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:21:59.698000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed1a9a60 a2=0 a3=1 items=0 ppid=2364 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:21:59.701000 audit[2391]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:21:59.701000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd18edb30 a2=0 a3=1 items=0 ppid=2364 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:21:59.703000 audit[2392]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:21:59.703000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe2ccfd10 a2=0 a3=1 items=0 ppid=2364 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:21:59.706000 audit[2393]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:21:59.706000 audit[2393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffed1dc7f0 a2=0 a3=1 items=0 ppid=2364 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:21:59.708183 kubelet[2364]: W0412 18:21:59.708101 2364 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.20.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.708298 kubelet[2364]: E0412 18:21:59.708198 2364 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.20.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:21:59.712647 kubelet[2364]: I0412 18:21:59.712604 2364 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:21:59.712647 kubelet[2364]: I0412 18:21:59.712644 2364 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:21:59.712840 kubelet[2364]: I0412 18:21:59.712677 2364 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:21:59.715847 kubelet[2364]: I0412 18:21:59.715799 2364 policy_none.go:49] "None policy: Start" Apr 12 18:21:59.716983 kubelet[2364]: I0412 18:21:59.716952 2364 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:21:59.717182 kubelet[2364]: I0412 18:21:59.717160 2364 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:21:59.726870 systemd[1]: Created slice kubepods.slice. Apr 12 18:21:59.737436 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:21:59.744000 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:21:59.745294 kubelet[2364]: I0412 18:21:59.745250 2364 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-20-40" Apr 12 18:21:59.747307 kubelet[2364]: E0412 18:21:59.747249 2364 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.20.40:6443/api/v1/nodes\": dial tcp 172.31.20.40:6443: connect: connection refused" node="ip-172-31-20-40" Apr 12 18:21:59.756308 kubelet[2364]: I0412 18:21:59.756275 2364 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:21:59.755000 audit[2364]: AVC avc: denied { mac_admin } for pid=2364 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:21:59.755000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:21:59.755000 audit[2364]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a50090 a1=4000a5e600 a2=4000a50060 a3=25 items=0 ppid=1 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:21:59.755000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:21:59.757111 kubelet[2364]: I0412 18:21:59.756689 2364 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:21:59.757111 kubelet[2364]: I0412 18:21:59.757014 2364 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:21:59.759654 kubelet[2364]: E0412 18:21:59.759612 2364 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-20-40\" not found" Apr 12 18:21:59.789366 kubelet[2364]: I0412 18:21:59.789285 2364 topology_manager.go:215] "Topology Admit Handler" podUID="a11652f31b52b9d62307883b50decdba" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-20-40" Apr 12 18:21:59.792132 kubelet[2364]: I0412 18:21:59.792069 2364 topology_manager.go:215] "Topology Admit Handler" podUID="ad6eed81fddedd7d0f958c503ba47f9f" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-20-40" Apr 12 18:21:59.794226 kubelet[2364]: I0412 18:21:59.794182 2364 topology_manager.go:215] "Topology Admit Handler" podUID="3012f8f0b4c6a509edaa6fcbdd1cdb7d" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-20-40" Apr 12 18:21:59.806984 systemd[1]: Created slice kubepods-burstable-poda11652f31b52b9d62307883b50decdba.slice. Apr 12 18:21:59.829972 systemd[1]: Created slice kubepods-burstable-podad6eed81fddedd7d0f958c503ba47f9f.slice. Apr 12 18:21:59.841429 systemd[1]: Created slice kubepods-burstable-pod3012f8f0b4c6a509edaa6fcbdd1cdb7d.slice. Apr 12 18:21:59.843084 kubelet[2364]: I0412 18:21:59.842937 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a11652f31b52b9d62307883b50decdba-ca-certs\") pod \"kube-apiserver-ip-172-31-20-40\" (UID: \"a11652f31b52b9d62307883b50decdba\") " pod="kube-system/kube-apiserver-ip-172-31-20-40" Apr 12 18:21:59.845341 kubelet[2364]: I0412 18:21:59.845306 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-ca-certs\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:21:59.845579 kubelet[2364]: I0412 18:21:59.845553 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-kubeconfig\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:21:59.847903 kubelet[2364]: I0412 18:21:59.845772 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:21:59.848514 kubelet[2364]: I0412 18:21:59.848481 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a11652f31b52b9d62307883b50decdba-k8s-certs\") pod \"kube-apiserver-ip-172-31-20-40\" (UID: \"a11652f31b52b9d62307883b50decdba\") " pod="kube-system/kube-apiserver-ip-172-31-20-40" Apr 12 18:21:59.848748 kubelet[2364]: I0412 18:21:59.848707 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a11652f31b52b9d62307883b50decdba-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-20-40\" (UID: \"a11652f31b52b9d62307883b50decdba\") " pod="kube-system/kube-apiserver-ip-172-31-20-40" Apr 12 18:21:59.848973 kubelet[2364]: E0412 18:21:59.845822 2364 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-40?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" interval="400ms" Apr 12 18:21:59.849156 kubelet[2364]: I0412 18:21:59.849122 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:21:59.849302 kubelet[2364]: I0412 18:21:59.849282 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-k8s-certs\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:21:59.849460 kubelet[2364]: I0412 18:21:59.849440 2364 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3012f8f0b4c6a509edaa6fcbdd1cdb7d-kubeconfig\") pod \"kube-scheduler-ip-172-31-20-40\" (UID: \"3012f8f0b4c6a509edaa6fcbdd1cdb7d\") " pod="kube-system/kube-scheduler-ip-172-31-20-40" Apr 12 18:21:59.949520 kubelet[2364]: I0412 18:21:59.949486 2364 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-20-40" Apr 12 18:21:59.950215 kubelet[2364]: E0412 18:21:59.950186 2364 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.20.40:6443/api/v1/nodes\": dial tcp 172.31.20.40:6443: connect: connection refused" node="ip-172-31-20-40" Apr 12 18:22:00.128695 env[1683]: time="2024-04-12T18:22:00.128548985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-20-40,Uid:a11652f31b52b9d62307883b50decdba,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:00.139711 env[1683]: time="2024-04-12T18:22:00.139639405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-20-40,Uid:ad6eed81fddedd7d0f958c503ba47f9f,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:00.149604 env[1683]: time="2024-04-12T18:22:00.149540428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-20-40,Uid:3012f8f0b4c6a509edaa6fcbdd1cdb7d,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:00.213929 amazon-ssm-agent[1719]: 2024-04-12 18:22:00 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Apr 12 18:22:00.249757 kubelet[2364]: E0412 18:22:00.249680 2364 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-40?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" interval="800ms" Apr 12 18:22:00.353160 kubelet[2364]: I0412 18:22:00.352514 2364 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-20-40" Apr 12 18:22:00.353160 kubelet[2364]: E0412 18:22:00.353108 2364 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.20.40:6443/api/v1/nodes\": dial tcp 172.31.20.40:6443: connect: connection refused" node="ip-172-31-20-40" Apr 12 18:22:00.595481 kubelet[2364]: W0412 18:22:00.595327 2364 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.20.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-20-40&limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:22:00.595481 kubelet[2364]: E0412 18:22:00.595415 2364 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.20.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-20-40&limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:22:00.630298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount428288099.mount: Deactivated successfully. Apr 12 18:22:00.639878 env[1683]: time="2024-04-12T18:22:00.639802463Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.647598 env[1683]: time="2024-04-12T18:22:00.647527329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.653074 env[1683]: time="2024-04-12T18:22:00.653004596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.655144 env[1683]: time="2024-04-12T18:22:00.655093567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.656631 env[1683]: time="2024-04-12T18:22:00.656568945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.658032 env[1683]: time="2024-04-12T18:22:00.657986166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.660590 env[1683]: time="2024-04-12T18:22:00.660545692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.664812 env[1683]: time="2024-04-12T18:22:00.664761977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.671077 env[1683]: time="2024-04-12T18:22:00.671014802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.674940 env[1683]: time="2024-04-12T18:22:00.674888353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.676490 env[1683]: time="2024-04-12T18:22:00.676446477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.678388 env[1683]: time="2024-04-12T18:22:00.678331037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:00.730294 env[1683]: time="2024-04-12T18:22:00.730051159Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:00.730294 env[1683]: time="2024-04-12T18:22:00.730135549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:00.730294 env[1683]: time="2024-04-12T18:22:00.730162347Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:00.730812 env[1683]: time="2024-04-12T18:22:00.730730397Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa6476f2ba3ee83fd334d2f4663fd7a576ef891aa47120da4f4986d49efb1580 pid=2405 runtime=io.containerd.runc.v2 Apr 12 18:22:00.738971 env[1683]: time="2024-04-12T18:22:00.738818758Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:00.739149 env[1683]: time="2024-04-12T18:22:00.738929310Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:00.739149 env[1683]: time="2024-04-12T18:22:00.738956720Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:00.739328 env[1683]: time="2024-04-12T18:22:00.739183945Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b02cc7af4876821f8ebd37930ff0910e66ef2595447e0e172530f9dcbb9fe09a pid=2417 runtime=io.containerd.runc.v2 Apr 12 18:22:00.742768 env[1683]: time="2024-04-12T18:22:00.742653631Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:00.743246 env[1683]: time="2024-04-12T18:22:00.743181850Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:00.743442 env[1683]: time="2024-04-12T18:22:00.743394662Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:00.744112 env[1683]: time="2024-04-12T18:22:00.744041570Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f6f558e409b1a9620286c4927c0ed48556fec08087c4ffaf9181c46a67c4e54 pid=2437 runtime=io.containerd.runc.v2 Apr 12 18:22:00.749775 kubelet[2364]: W0412 18:22:00.749642 2364 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.20.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:22:00.749775 kubelet[2364]: E0412 18:22:00.749707 2364 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.20.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:22:00.774679 systemd[1]: Started cri-containerd-aa6476f2ba3ee83fd334d2f4663fd7a576ef891aa47120da4f4986d49efb1580.scope. Apr 12 18:22:00.794974 systemd[1]: Started cri-containerd-b02cc7af4876821f8ebd37930ff0910e66ef2595447e0e172530f9dcbb9fe09a.scope. Apr 12 18:22:00.806480 systemd[1]: Started cri-containerd-1f6f558e409b1a9620286c4927c0ed48556fec08087c4ffaf9181c46a67c4e54.scope. Apr 12 18:22:00.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.848000 audit: BPF prog-id=70 op=LOAD Apr 12 18:22:00.850000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.850000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2405 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363437366632626133656538336664333334643266343636336664 Apr 12 18:22:00.850000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.850000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2405 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363437366632626133656538336664333334643266343636336664 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.851000 audit: BPF prog-id=71 op=LOAD Apr 12 18:22:00.851000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2405 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363437366632626133656538336664333334643266343636336664 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.852000 audit: BPF prog-id=72 op=LOAD Apr 12 18:22:00.852000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2405 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363437366632626133656538336664333334643266343636336664 Apr 12 18:22:00.854000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:22:00.854000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.858000 audit: BPF prog-id=73 op=LOAD Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2437 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166366635353865343039623161393632303238366334393237633065 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2437 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166366635353865343039623161393632303238366334393237633065 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.859000 audit: BPF prog-id=74 op=LOAD Apr 12 18:22:00.859000 audit[2459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2437 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166366635353865343039623161393632303238366334393237633065 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit: BPF prog-id=75 op=LOAD Apr 12 18:22:00.860000 audit[2459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2437 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166366635353865343039623161393632303238366334393237633065 Apr 12 18:22:00.860000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:22:00.860000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.860000 audit: BPF prog-id=76 op=LOAD Apr 12 18:22:00.860000 audit[2459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2437 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166366635353865343039623161393632303238366334393237633065 Apr 12 18:22:00.855000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.855000 audit: BPF prog-id=77 op=LOAD Apr 12 18:22:00.855000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2405 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363437366632626133656538336664333334643266343636336664 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.866000 audit: BPF prog-id=78 op=LOAD Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2417 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326363376166343837363832316638656264333739333066663039 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2417 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326363376166343837363832316638656264333739333066663039 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit: BPF prog-id=79 op=LOAD Apr 12 18:22:00.870000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2417 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326363376166343837363832316638656264333739333066663039 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit: BPF prog-id=80 op=LOAD Apr 12 18:22:00.870000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2417 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326363376166343837363832316638656264333739333066663039 Apr 12 18:22:00.870000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:22:00.870000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:00.870000 audit: BPF prog-id=81 op=LOAD Apr 12 18:22:00.870000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2417 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:00.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326363376166343837363832316638656264333739333066663039 Apr 12 18:22:00.932522 env[1683]: time="2024-04-12T18:22:00.932453705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-20-40,Uid:ad6eed81fddedd7d0f958c503ba47f9f,Namespace:kube-system,Attempt:0,} returns sandbox id \"1f6f558e409b1a9620286c4927c0ed48556fec08087c4ffaf9181c46a67c4e54\"" Apr 12 18:22:00.937237 kubelet[2364]: W0412 18:22:00.936767 2364 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.20.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:22:00.937237 kubelet[2364]: E0412 18:22:00.936944 2364 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.20.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:22:00.943010 env[1683]: time="2024-04-12T18:22:00.942953885Z" level=info msg="CreateContainer within sandbox \"1f6f558e409b1a9620286c4927c0ed48556fec08087c4ffaf9181c46a67c4e54\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:22:00.949673 kubelet[2364]: W0412 18:22:00.949498 2364 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.20.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:22:00.949673 kubelet[2364]: E0412 18:22:00.949609 2364 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.20.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.20.40:6443: connect: connection refused Apr 12 18:22:00.951942 env[1683]: time="2024-04-12T18:22:00.951885512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-20-40,Uid:3012f8f0b4c6a509edaa6fcbdd1cdb7d,Namespace:kube-system,Attempt:0,} returns sandbox id \"aa6476f2ba3ee83fd334d2f4663fd7a576ef891aa47120da4f4986d49efb1580\"" Apr 12 18:22:00.956962 env[1683]: time="2024-04-12T18:22:00.956898980Z" level=info msg="CreateContainer within sandbox \"aa6476f2ba3ee83fd334d2f4663fd7a576ef891aa47120da4f4986d49efb1580\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:22:00.974681 env[1683]: time="2024-04-12T18:22:00.972913450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-20-40,Uid:a11652f31b52b9d62307883b50decdba,Namespace:kube-system,Attempt:0,} returns sandbox id \"b02cc7af4876821f8ebd37930ff0910e66ef2595447e0e172530f9dcbb9fe09a\"" Apr 12 18:22:00.983235 env[1683]: time="2024-04-12T18:22:00.983160855Z" level=info msg="CreateContainer within sandbox \"1f6f558e409b1a9620286c4927c0ed48556fec08087c4ffaf9181c46a67c4e54\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b\"" Apr 12 18:22:00.985555 env[1683]: time="2024-04-12T18:22:00.985483124Z" level=info msg="StartContainer for \"f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b\"" Apr 12 18:22:00.988238 env[1683]: time="2024-04-12T18:22:00.988164663Z" level=info msg="CreateContainer within sandbox \"b02cc7af4876821f8ebd37930ff0910e66ef2595447e0e172530f9dcbb9fe09a\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:22:01.006510 env[1683]: time="2024-04-12T18:22:01.006421385Z" level=info msg="CreateContainer within sandbox \"b02cc7af4876821f8ebd37930ff0910e66ef2595447e0e172530f9dcbb9fe09a\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e036e0ebc4fc3fa632eabf6fec8ccd8e1ef043f08d911730988383e2451578c6\"" Apr 12 18:22:01.007357 env[1683]: time="2024-04-12T18:22:01.007306292Z" level=info msg="StartContainer for \"e036e0ebc4fc3fa632eabf6fec8ccd8e1ef043f08d911730988383e2451578c6\"" Apr 12 18:22:01.015952 env[1683]: time="2024-04-12T18:22:01.015835377Z" level=info msg="CreateContainer within sandbox \"aa6476f2ba3ee83fd334d2f4663fd7a576ef891aa47120da4f4986d49efb1580\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5\"" Apr 12 18:22:01.017887 env[1683]: time="2024-04-12T18:22:01.017801272Z" level=info msg="StartContainer for \"9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5\"" Apr 12 18:22:01.046079 systemd[1]: Started cri-containerd-f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b.scope. Apr 12 18:22:01.051639 kubelet[2364]: E0412 18:22:01.051594 2364 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-40?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" interval="1.6s" Apr 12 18:22:01.079298 systemd[1]: Started cri-containerd-e036e0ebc4fc3fa632eabf6fec8ccd8e1ef043f08d911730988383e2451578c6.scope. Apr 12 18:22:01.104292 systemd[1]: Started cri-containerd-9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5.scope. Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.118000 audit: BPF prog-id=82 op=LOAD Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2437 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383766353938643235366561643930646166316364613936346237 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2437 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383766353938643235366561643930646166316364613936346237 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit: BPF prog-id=83 op=LOAD Apr 12 18:22:01.119000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2437 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383766353938643235366561643930646166316364613936346237 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit: BPF prog-id=84 op=LOAD Apr 12 18:22:01.119000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2437 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383766353938643235366561643930646166316364613936346237 Apr 12 18:22:01.119000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:22:01.119000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.119000 audit: BPF prog-id=85 op=LOAD Apr 12 18:22:01.119000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2437 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383766353938643235366561643930646166316364613936346237 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.139000 audit: BPF prog-id=86 op=LOAD Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2417 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333665306562633466633366613633326561626636666563386363 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2417 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333665306562633466633366613633326561626636666563386363 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.140000 audit: BPF prog-id=87 op=LOAD Apr 12 18:22:01.140000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2417 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333665306562633466633366613633326561626636666563386363 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.142000 audit: BPF prog-id=88 op=LOAD Apr 12 18:22:01.142000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2417 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333665306562633466633366613633326561626636666563386363 Apr 12 18:22:01.144000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:22:01.144000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.145000 audit: BPF prog-id=89 op=LOAD Apr 12 18:22:01.145000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2417 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333665306562633466633366613633326561626636666563386363 Apr 12 18:22:01.157029 kubelet[2364]: I0412 18:22:01.156502 2364 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-20-40" Apr 12 18:22:01.158081 kubelet[2364]: E0412 18:22:01.158001 2364 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.20.40:6443/api/v1/nodes\": dial tcp 172.31.20.40:6443: connect: connection refused" node="ip-172-31-20-40" Apr 12 18:22:01.196256 env[1683]: time="2024-04-12T18:22:01.194152285Z" level=info msg="StartContainer for \"f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b\" returns successfully" Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.207000 audit: BPF prog-id=90 op=LOAD Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2405 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383638313763626434366631333839306533623263353037363339 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2405 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383638313763626434366631333839306533623263353037363339 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit: BPF prog-id=91 op=LOAD Apr 12 18:22:01.209000 audit[2550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2405 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383638313763626434366631333839306533623263353037363339 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit: BPF prog-id=92 op=LOAD Apr 12 18:22:01.209000 audit[2550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2405 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383638313763626434366631333839306533623263353037363339 Apr 12 18:22:01.209000 audit: BPF prog-id=92 op=UNLOAD Apr 12 18:22:01.209000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:01.209000 audit: BPF prog-id=93 op=LOAD Apr 12 18:22:01.209000 audit[2550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2405 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:01.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383638313763626434366631333839306533623263353037363339 Apr 12 18:22:01.226537 env[1683]: time="2024-04-12T18:22:01.226407223Z" level=info msg="StartContainer for \"e036e0ebc4fc3fa632eabf6fec8ccd8e1ef043f08d911730988383e2451578c6\" returns successfully" Apr 12 18:22:01.278442 env[1683]: time="2024-04-12T18:22:01.278367897Z" level=info msg="StartContainer for \"9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5\" returns successfully" Apr 12 18:22:02.760440 kubelet[2364]: I0412 18:22:02.760389 2364 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-20-40" Apr 12 18:22:04.272317 kernel: kauditd_printk_skb: 559 callbacks suppressed Apr 12 18:22:04.272462 kernel: audit: type=1400 audit(1712946124.259:725): avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:04.259000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:04.259000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40009dc660 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:04.259000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:04.298724 kernel: audit: type=1300 audit(1712946124.259:725): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40009dc660 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:04.298880 kernel: audit: type=1327 audit(1712946124.259:725): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:04.272000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:04.308195 kernel: audit: type=1400 audit(1712946124.272:726): avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:04.272000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400004a260 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:04.320405 kernel: audit: type=1300 audit(1712946124.272:726): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400004a260 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:04.272000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:04.330720 kernel: audit: type=1327 audit(1712946124.272:726): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:04.486478 update_engine[1678]: I0412 18:22:04.485919 1678 update_attempter.cc:509] Updating boot flags... Apr 12 18:22:05.828000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:05.832000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:05.850870 kernel: audit: type=1400 audit(1712946125.828:727): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:05.851020 kernel: audit: type=1400 audit(1712946125.832:728): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:05.832000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003058a80 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:22:05.863574 kernel: audit: type=1300 audit(1712946125.832:728): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003058a80 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:22:05.832000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:05.828000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4006b210b0 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:22:05.828000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:05.838000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:05.838000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=40072eca20 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:22:05.874935 kernel: audit: type=1327 audit(1712946125.832:728): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:05.838000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:05.844000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:05.844000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=4000fbc450 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:22:05.844000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:05.870000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:05.870000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=4006ab3000 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:22:05.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:05.870000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:05.870000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=4002b022d0 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:22:05.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:22:06.137470 kubelet[2364]: E0412 18:22:06.137337 2364 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-20-40\" not found" node="ip-172-31-20-40" Apr 12 18:22:06.218085 kubelet[2364]: I0412 18:22:06.218022 2364 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-20-40" Apr 12 18:22:06.626366 kubelet[2364]: I0412 18:22:06.626327 2364 apiserver.go:52] "Watching apiserver" Apr 12 18:22:06.642109 kubelet[2364]: I0412 18:22:06.642054 2364 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:22:09.397121 systemd[1]: Reloading. Apr 12 18:22:09.580415 /usr/lib/systemd/system-generators/torcx-generator[2757]: time="2024-04-12T18:22:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:22:09.581119 /usr/lib/systemd/system-generators/torcx-generator[2757]: time="2024-04-12T18:22:09Z" level=info msg="torcx already run" Apr 12 18:22:09.791482 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:22:09.791726 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:22:09.836818 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:22:09.929917 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 18:22:09.930062 kernel: audit: type=1400 audit(1712946129.919:733): avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:09.919000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:09.919000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f545c0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:09.949738 kernel: audit: type=1300 audit(1712946129.919:733): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f545c0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:09.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:09.959817 kernel: audit: type=1327 audit(1712946129.919:733): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:09.921000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:09.968976 kernel: audit: type=1400 audit(1712946129.921:734): avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:09.921000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000eb9fa0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:09.982813 kernel: audit: type=1300 audit(1712946129.921:734): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000eb9fa0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:09.921000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:09.993796 kernel: audit: type=1327 audit(1712946129.921:734): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:09.921000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:10.003056 kernel: audit: type=1400 audit(1712946129.921:735): avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:09.921000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010b4700 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:10.015525 kernel: audit: type=1300 audit(1712946129.921:735): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010b4700 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:09.921000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:10.027080 kernel: audit: type=1327 audit(1712946129.921:735): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:09.921000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:10.037158 kernel: audit: type=1400 audit(1712946129.921:736): avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:22:09.921000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010b4740 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:09.921000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:10.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.061000 audit: BPF prog-id=94 op=LOAD Apr 12 18:22:10.061000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.065000 audit: BPF prog-id=95 op=LOAD Apr 12 18:22:10.068000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:22:10.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.071000 audit: BPF prog-id=96 op=LOAD Apr 12 18:22:10.071000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.073000 audit: BPF prog-id=97 op=LOAD Apr 12 18:22:10.073000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:22:10.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.074000 audit: BPF prog-id=98 op=LOAD Apr 12 18:22:10.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.075000 audit: BPF prog-id=99 op=LOAD Apr 12 18:22:10.075000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:22:10.076000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.080000 audit: BPF prog-id=100 op=LOAD Apr 12 18:22:10.080000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:22:10.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit: BPF prog-id=101 op=LOAD Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.084000 audit: BPF prog-id=102 op=LOAD Apr 12 18:22:10.084000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:22:10.084000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.086000 audit: BPF prog-id=103 op=LOAD Apr 12 18:22:10.086000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit: BPF prog-id=104 op=LOAD Apr 12 18:22:10.089000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.090000 audit: BPF prog-id=105 op=LOAD Apr 12 18:22:10.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.091000 audit: BPF prog-id=106 op=LOAD Apr 12 18:22:10.091000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:22:10.091000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.093000 audit: BPF prog-id=107 op=LOAD Apr 12 18:22:10.093000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.095000 audit: BPF prog-id=108 op=LOAD Apr 12 18:22:10.096000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit: BPF prog-id=109 op=LOAD Apr 12 18:22:10.099000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit: BPF prog-id=110 op=LOAD Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.101000 audit: BPF prog-id=111 op=LOAD Apr 12 18:22:10.101000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:22:10.101000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.107000 audit: BPF prog-id=112 op=LOAD Apr 12 18:22:10.107000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.113000 audit: BPF prog-id=113 op=LOAD Apr 12 18:22:10.113000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.117000 audit: BPF prog-id=114 op=LOAD Apr 12 18:22:10.117000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:22:10.165015 systemd[1]: Stopping kubelet.service... Apr 12 18:22:10.184640 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:22:10.185125 systemd[1]: Stopped kubelet.service. Apr 12 18:22:10.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.185226 systemd[1]: kubelet.service: Consumed 1.509s CPU time. Apr 12 18:22:10.188544 systemd[1]: Started kubelet.service. Apr 12 18:22:10.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:10.336793 kubelet[2811]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:22:10.339568 kubelet[2811]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:22:10.339725 kubelet[2811]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:22:10.340036 kubelet[2811]: I0412 18:22:10.339972 2811 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:22:10.351073 kubelet[2811]: I0412 18:22:10.351022 2811 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:22:10.351073 kubelet[2811]: I0412 18:22:10.351066 2811 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:22:10.355153 kubelet[2811]: I0412 18:22:10.355101 2811 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:22:10.359794 kubelet[2811]: I0412 18:22:10.359756 2811 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:22:10.362160 kubelet[2811]: I0412 18:22:10.362121 2811 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:22:10.378238 kubelet[2811]: W0412 18:22:10.378202 2811 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:22:10.380321 kubelet[2811]: I0412 18:22:10.380275 2811 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:22:10.380983 kubelet[2811]: I0412 18:22:10.380957 2811 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:22:10.381408 kubelet[2811]: I0412 18:22:10.381376 2811 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:22:10.381661 kubelet[2811]: I0412 18:22:10.381636 2811 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:22:10.381778 kubelet[2811]: I0412 18:22:10.381757 2811 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:22:10.381965 kubelet[2811]: I0412 18:22:10.381944 2811 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:22:10.382368 kubelet[2811]: I0412 18:22:10.382328 2811 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:22:10.393035 kubelet[2811]: I0412 18:22:10.392993 2811 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:22:10.393255 kubelet[2811]: I0412 18:22:10.393232 2811 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:22:10.393417 kubelet[2811]: I0412 18:22:10.393396 2811 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:22:10.410123 kubelet[2811]: I0412 18:22:10.410085 2811 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:22:10.411243 kubelet[2811]: I0412 18:22:10.411216 2811 server.go:1232] "Started kubelet" Apr 12 18:22:10.426000 audit[2811]: AVC avc: denied { mac_admin } for pid=2811 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.426000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:10.426000 audit[2811]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ce1230 a1=4000cb7320 a2=4000ce1200 a3=25 items=0 ppid=1 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:10.426000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:10.429984 kubelet[2811]: I0412 18:22:10.429934 2811 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:22:10.429000 audit[2811]: AVC avc: denied { mac_admin } for pid=2811 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.429000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:10.429000 audit[2811]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cbf200 a1=4000cb7338 a2=4000ce12c0 a3=25 items=0 ppid=1 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:10.429000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:10.430661 kubelet[2811]: I0412 18:22:10.430613 2811 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:22:10.430829 kubelet[2811]: I0412 18:22:10.430807 2811 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:22:10.436206 kubelet[2811]: I0412 18:22:10.436129 2811 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:22:10.436591 kubelet[2811]: E0412 18:22:10.436543 2811 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:22:10.436710 kubelet[2811]: E0412 18:22:10.436596 2811 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:22:10.449992 kubelet[2811]: I0412 18:22:10.447501 2811 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:22:10.449992 kubelet[2811]: I0412 18:22:10.448021 2811 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:22:10.450241 kubelet[2811]: I0412 18:22:10.439407 2811 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:22:10.457025 kubelet[2811]: I0412 18:22:10.456985 2811 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:22:10.468285 kubelet[2811]: I0412 18:22:10.468209 2811 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:22:10.476413 kubelet[2811]: I0412 18:22:10.476376 2811 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:22:10.544324 kubelet[2811]: I0412 18:22:10.544290 2811 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:22:10.548027 kubelet[2811]: I0412 18:22:10.547989 2811 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:22:10.548232 kubelet[2811]: I0412 18:22:10.548210 2811 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:22:10.548395 kubelet[2811]: I0412 18:22:10.548373 2811 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:22:10.548572 kubelet[2811]: E0412 18:22:10.548552 2811 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:22:10.572296 kubelet[2811]: I0412 18:22:10.572251 2811 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-20-40" Apr 12 18:22:10.604084 kubelet[2811]: I0412 18:22:10.602345 2811 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-20-40" Apr 12 18:22:10.604084 kubelet[2811]: I0412 18:22:10.602460 2811 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-20-40" Apr 12 18:22:10.658844 kubelet[2811]: E0412 18:22:10.658783 2811 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:22:10.672561 kubelet[2811]: I0412 18:22:10.672513 2811 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:22:10.672561 kubelet[2811]: I0412 18:22:10.672553 2811 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:22:10.672760 kubelet[2811]: I0412 18:22:10.672588 2811 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:22:10.672873 kubelet[2811]: I0412 18:22:10.672829 2811 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:22:10.672956 kubelet[2811]: I0412 18:22:10.672915 2811 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:22:10.672956 kubelet[2811]: I0412 18:22:10.672934 2811 policy_none.go:49] "None policy: Start" Apr 12 18:22:10.679238 kubelet[2811]: I0412 18:22:10.679175 2811 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:22:10.679238 kubelet[2811]: I0412 18:22:10.679234 2811 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:22:10.679583 kubelet[2811]: I0412 18:22:10.679547 2811 state_mem.go:75] "Updated machine memory state" Apr 12 18:22:10.688053 kubelet[2811]: I0412 18:22:10.688002 2811 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:22:10.688199 kubelet[2811]: I0412 18:22:10.688116 2811 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:22:10.689541 kubelet[2811]: I0412 18:22:10.689378 2811 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:22:10.687000 audit[2811]: AVC avc: denied { mac_admin } for pid=2811 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:10.687000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:22:10.687000 audit[2811]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400126db00 a1=4000c69a40 a2=400126dad0 a3=25 items=0 ppid=1 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:10.687000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:22:10.859557 kubelet[2811]: I0412 18:22:10.859407 2811 topology_manager.go:215] "Topology Admit Handler" podUID="a11652f31b52b9d62307883b50decdba" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-20-40" Apr 12 18:22:10.859724 kubelet[2811]: I0412 18:22:10.859571 2811 topology_manager.go:215] "Topology Admit Handler" podUID="ad6eed81fddedd7d0f958c503ba47f9f" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-20-40" Apr 12 18:22:10.859724 kubelet[2811]: I0412 18:22:10.859650 2811 topology_manager.go:215] "Topology Admit Handler" podUID="3012f8f0b4c6a509edaa6fcbdd1cdb7d" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-20-40" Apr 12 18:22:10.882604 kubelet[2811]: I0412 18:22:10.882538 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a11652f31b52b9d62307883b50decdba-k8s-certs\") pod \"kube-apiserver-ip-172-31-20-40\" (UID: \"a11652f31b52b9d62307883b50decdba\") " pod="kube-system/kube-apiserver-ip-172-31-20-40" Apr 12 18:22:10.882776 kubelet[2811]: I0412 18:22:10.882623 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-ca-certs\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:22:10.882776 kubelet[2811]: I0412 18:22:10.882700 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3012f8f0b4c6a509edaa6fcbdd1cdb7d-kubeconfig\") pod \"kube-scheduler-ip-172-31-20-40\" (UID: \"3012f8f0b4c6a509edaa6fcbdd1cdb7d\") " pod="kube-system/kube-scheduler-ip-172-31-20-40" Apr 12 18:22:10.882776 kubelet[2811]: I0412 18:22:10.882748 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a11652f31b52b9d62307883b50decdba-ca-certs\") pod \"kube-apiserver-ip-172-31-20-40\" (UID: \"a11652f31b52b9d62307883b50decdba\") " pod="kube-system/kube-apiserver-ip-172-31-20-40" Apr 12 18:22:10.883063 kubelet[2811]: I0412 18:22:10.882795 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a11652f31b52b9d62307883b50decdba-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-20-40\" (UID: \"a11652f31b52b9d62307883b50decdba\") " pod="kube-system/kube-apiserver-ip-172-31-20-40" Apr 12 18:22:10.883063 kubelet[2811]: I0412 18:22:10.882842 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:22:10.883063 kubelet[2811]: I0412 18:22:10.882916 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-k8s-certs\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:22:10.883063 kubelet[2811]: I0412 18:22:10.882963 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-kubeconfig\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:22:10.883063 kubelet[2811]: I0412 18:22:10.883015 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ad6eed81fddedd7d0f958c503ba47f9f-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-20-40\" (UID: \"ad6eed81fddedd7d0f958c503ba47f9f\") " pod="kube-system/kube-controller-manager-ip-172-31-20-40" Apr 12 18:22:11.118000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:22:11.118000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d23a80 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:22:11.118000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:22:11.403252 kubelet[2811]: I0412 18:22:11.403107 2811 apiserver.go:52] "Watching apiserver" Apr 12 18:22:11.468958 kubelet[2811]: I0412 18:22:11.468909 2811 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:22:11.601693 kubelet[2811]: E0412 18:22:11.601640 2811 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-20-40\" already exists" pod="kube-system/kube-scheduler-ip-172-31-20-40" Apr 12 18:22:11.633520 kubelet[2811]: I0412 18:22:11.633458 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-20-40" podStartSLOduration=1.633367354 podCreationTimestamp="2024-04-12 18:22:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:22:11.63234683 +0000 UTC m=+1.430194649" watchObservedRunningTime="2024-04-12 18:22:11.633367354 +0000 UTC m=+1.431215197" Apr 12 18:22:11.647500 kubelet[2811]: I0412 18:22:11.647425 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-20-40" podStartSLOduration=1.6473430169999999 podCreationTimestamp="2024-04-12 18:22:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:22:11.644754313 +0000 UTC m=+1.442602144" watchObservedRunningTime="2024-04-12 18:22:11.647343017 +0000 UTC m=+1.445190872" Apr 12 18:22:11.683543 kubelet[2811]: I0412 18:22:11.683501 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-20-40" podStartSLOduration=1.683449693 podCreationTimestamp="2024-04-12 18:22:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:22:11.663692347 +0000 UTC m=+1.461540178" watchObservedRunningTime="2024-04-12 18:22:11.683449693 +0000 UTC m=+1.481297524" Apr 12 18:22:17.085935 sudo[1951]: pam_unix(sudo:session): session closed for user root Apr 12 18:22:17.085000 audit[1951]: USER_END pid=1951 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.088708 kernel: kauditd_printk_skb: 263 callbacks suppressed Apr 12 18:22:17.088842 kernel: audit: type=1106 audit(1712946137.085:987): pid=1951 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.085000 audit[1951]: CRED_DISP pid=1951 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.105877 kernel: audit: type=1104 audit(1712946137.085:988): pid=1951 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.108955 sshd[1948]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:17.110000 audit[1948]: USER_END pid=1948 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.110000 audit[1948]: CRED_DISP pid=1948 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.125911 systemd[1]: sshd@6-172.31.20.40:22-139.178.89.65:38684.service: Deactivated successfully. Apr 12 18:22:17.127280 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:22:17.127587 systemd[1]: session-7.scope: Consumed 9.864s CPU time. Apr 12 18:22:17.135245 kernel: audit: type=1106 audit(1712946137.110:989): pid=1948 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.135355 kernel: audit: type=1104 audit(1712946137.110:990): pid=1948 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:17.135316 systemd-logind[1677]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:22:17.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.40:22-139.178.89.65:38684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:17.137208 systemd-logind[1677]: Removed session 7. Apr 12 18:22:17.145748 kernel: audit: type=1131 audit(1712946137.125:991): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.40:22-139.178.89.65:38684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:22.124060 kubelet[2811]: I0412 18:22:22.124005 2811 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:22:22.124933 env[1683]: time="2024-04-12T18:22:22.124834935Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:22:22.125745 kubelet[2811]: I0412 18:22:22.125714 2811 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:22:22.131540 kubelet[2811]: I0412 18:22:22.131453 2811 topology_manager.go:215] "Topology Admit Handler" podUID="afb16122-7e34-4c4b-bb70-e6e173b30b27" podNamespace="kube-system" podName="kube-proxy-tn42n" Apr 12 18:22:22.142156 systemd[1]: Created slice kubepods-besteffort-podafb16122_7e34_4c4b_bb70_e6e173b30b27.slice. Apr 12 18:22:22.154107 kubelet[2811]: I0412 18:22:22.154066 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/afb16122-7e34-4c4b-bb70-e6e173b30b27-kube-proxy\") pod \"kube-proxy-tn42n\" (UID: \"afb16122-7e34-4c4b-bb70-e6e173b30b27\") " pod="kube-system/kube-proxy-tn42n" Apr 12 18:22:22.154377 kubelet[2811]: I0412 18:22:22.154352 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/afb16122-7e34-4c4b-bb70-e6e173b30b27-lib-modules\") pod \"kube-proxy-tn42n\" (UID: \"afb16122-7e34-4c4b-bb70-e6e173b30b27\") " pod="kube-system/kube-proxy-tn42n" Apr 12 18:22:22.154581 kubelet[2811]: I0412 18:22:22.154556 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/afb16122-7e34-4c4b-bb70-e6e173b30b27-xtables-lock\") pod \"kube-proxy-tn42n\" (UID: \"afb16122-7e34-4c4b-bb70-e6e173b30b27\") " pod="kube-system/kube-proxy-tn42n" Apr 12 18:22:22.154764 kubelet[2811]: I0412 18:22:22.154740 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wdpjm\" (UniqueName: \"kubernetes.io/projected/afb16122-7e34-4c4b-bb70-e6e173b30b27-kube-api-access-wdpjm\") pod \"kube-proxy-tn42n\" (UID: \"afb16122-7e34-4c4b-bb70-e6e173b30b27\") " pod="kube-system/kube-proxy-tn42n" Apr 12 18:22:22.452506 env[1683]: time="2024-04-12T18:22:22.452412832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tn42n,Uid:afb16122-7e34-4c4b-bb70-e6e173b30b27,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:22.491967 env[1683]: time="2024-04-12T18:22:22.491534297Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:22.491967 env[1683]: time="2024-04-12T18:22:22.491631560Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:22.491967 env[1683]: time="2024-04-12T18:22:22.491658188Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:22.492423 env[1683]: time="2024-04-12T18:22:22.492308907Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d03f62517d6b8b5e5ed922866591d7b1086c343a5b7fe125530c0101b28f0cd1 pid=2897 runtime=io.containerd.runc.v2 Apr 12 18:22:22.530451 systemd[1]: Started cri-containerd-d03f62517d6b8b5e5ed922866591d7b1086c343a5b7fe125530c0101b28f0cd1.scope. Apr 12 18:22:22.596795 kubelet[2811]: I0412 18:22:22.596751 2811 topology_manager.go:215] "Topology Admit Handler" podUID="f60d0219-99ba-4b8b-b16b-a73bba4f8423" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-288w5" Apr 12 18:22:22.610908 systemd[1]: Created slice kubepods-besteffort-podf60d0219_99ba_4b8b_b16b_a73bba4f8423.slice. Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.666137 kubelet[2811]: I0412 18:22:22.666094 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-28bhg\" (UniqueName: \"kubernetes.io/projected/f60d0219-99ba-4b8b-b16b-a73bba4f8423-kube-api-access-28bhg\") pod \"tigera-operator-6bfc79cb9c-288w5\" (UID: \"f60d0219-99ba-4b8b-b16b-a73bba4f8423\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-288w5" Apr 12 18:22:22.666418 kubelet[2811]: I0412 18:22:22.666374 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f60d0219-99ba-4b8b-b16b-a73bba4f8423-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-288w5\" (UID: \"f60d0219-99ba-4b8b-b16b-a73bba4f8423\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-288w5" Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.674033 kernel: audit: type=1400 audit(1712946142.656:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.674172 kernel: audit: type=1400 audit(1712946142.656:993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.681795 kernel: audit: type=1400 audit(1712946142.656:994): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.689628 kernel: audit: type=1400 audit(1712946142.656:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.698131 kernel: audit: type=1400 audit(1712946142.656:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.706770 kernel: audit: type=1400 audit(1712946142.656:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.715144 kernel: audit: type=1400 audit(1712946142.656:998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.725129 kernel: audit: type=1400 audit(1712946142.656:999): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.725689 env[1683]: time="2024-04-12T18:22:22.725632518Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tn42n,Uid:afb16122-7e34-4c4b-bb70-e6e173b30b27,Namespace:kube-system,Attempt:0,} returns sandbox id \"d03f62517d6b8b5e5ed922866591d7b1086c343a5b7fe125530c0101b28f0cd1\"" Apr 12 18:22:22.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.741180 kernel: audit: type=1400 audit(1712946142.656:1000): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.741340 kernel: audit: type=1400 audit(1712946142.656:1001): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.656000 audit: BPF prog-id=115 op=LOAD Apr 12 18:22:22.659000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.659000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336636323531376436623862356535656439323238363635393164 Apr 12 18:22:22.659000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.659000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336636323531376436623862356535656439323238363635393164 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.661000 audit: BPF prog-id=116 op=LOAD Apr 12 18:22:22.661000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336636323531376436623862356535656439323238363635393164 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.664000 audit: BPF prog-id=117 op=LOAD Apr 12 18:22:22.664000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336636323531376436623862356535656439323238363635393164 Apr 12 18:22:22.664000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:22:22.664000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.668000 audit: BPF prog-id=118 op=LOAD Apr 12 18:22:22.668000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336636323531376436623862356535656439323238363635393164 Apr 12 18:22:22.750029 env[1683]: time="2024-04-12T18:22:22.748821829Z" level=info msg="CreateContainer within sandbox \"d03f62517d6b8b5e5ed922866591d7b1086c343a5b7fe125530c0101b28f0cd1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:22:22.772902 env[1683]: time="2024-04-12T18:22:22.772819170Z" level=info msg="CreateContainer within sandbox \"d03f62517d6b8b5e5ed922866591d7b1086c343a5b7fe125530c0101b28f0cd1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"48b84e5c18b283c0dc7c13711890b46b722617b62a6faa2f7a7570de1a691afc\"" Apr 12 18:22:22.776653 env[1683]: time="2024-04-12T18:22:22.776119240Z" level=info msg="StartContainer for \"48b84e5c18b283c0dc7c13711890b46b722617b62a6faa2f7a7570de1a691afc\"" Apr 12 18:22:22.812257 systemd[1]: Started cri-containerd-48b84e5c18b283c0dc7c13711890b46b722617b62a6faa2f7a7570de1a691afc.scope. Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2897 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623834653563313862323833633064633763313337313138393062 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.856000 audit: BPF prog-id=119 op=LOAD Apr 12 18:22:22.856000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2897 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623834653563313862323833633064633763313337313138393062 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.858000 audit: BPF prog-id=120 op=LOAD Apr 12 18:22:22.858000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2897 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623834653563313862323833633064633763313337313138393062 Apr 12 18:22:22.860000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:22:22.861000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:22.861000 audit: BPF prog-id=121 op=LOAD Apr 12 18:22:22.861000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2897 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:22.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623834653563313862323833633064633763313337313138393062 Apr 12 18:22:22.902808 env[1683]: time="2024-04-12T18:22:22.902729248Z" level=info msg="StartContainer for \"48b84e5c18b283c0dc7c13711890b46b722617b62a6faa2f7a7570de1a691afc\" returns successfully" Apr 12 18:22:22.916731 env[1683]: time="2024-04-12T18:22:22.916675466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-288w5,Uid:f60d0219-99ba-4b8b-b16b-a73bba4f8423,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:22:22.945327 env[1683]: time="2024-04-12T18:22:22.945178263Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:22.945478 env[1683]: time="2024-04-12T18:22:22.945377217Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:22.945543 env[1683]: time="2024-04-12T18:22:22.945485796Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:22.946046 env[1683]: time="2024-04-12T18:22:22.945959725Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/481133b51a1a2a387d3ce9ab416808eb38698335015a771464e283e2b7f394fb pid=2973 runtime=io.containerd.runc.v2 Apr 12 18:22:22.975099 systemd[1]: Started cri-containerd-481133b51a1a2a387d3ce9ab416808eb38698335015a771464e283e2b7f394fb.scope. Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.011000 audit: BPF prog-id=122 op=LOAD Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2973 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313133336235316131613261333837643363653961623431363830 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2973 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313133336235316131613261333837643363653961623431363830 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit: BPF prog-id=123 op=LOAD Apr 12 18:22:23.013000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2973 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313133336235316131613261333837643363653961623431363830 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit: BPF prog-id=124 op=LOAD Apr 12 18:22:23.013000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2973 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313133336235316131613261333837643363653961623431363830 Apr 12 18:22:23.013000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:22:23.013000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:23.013000 audit: BPF prog-id=125 op=LOAD Apr 12 18:22:23.013000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2973 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313133336235316131613261333837643363653961623431363830 Apr 12 18:22:23.075556 env[1683]: time="2024-04-12T18:22:23.075486959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-288w5,Uid:f60d0219-99ba-4b8b-b16b-a73bba4f8423,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"481133b51a1a2a387d3ce9ab416808eb38698335015a771464e283e2b7f394fb\"" Apr 12 18:22:23.084656 env[1683]: time="2024-04-12T18:22:23.082230724Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:22:23.117000 audit[3032]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=3032 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.117000 audit[3032]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd440f040 a2=0 a3=1 items=0 ppid=2950 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:22:23.123000 audit[3031]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.123000 audit[3031]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed33c890 a2=0 a3=1 items=0 ppid=2950 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:22:23.127000 audit[3033]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=3033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.127000 audit[3033]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc97d3cf0 a2=0 a3=1 items=0 ppid=2950 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:22:23.130000 audit[3035]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=3035 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.130000 audit[3035]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc802b740 a2=0 a3=1 items=0 ppid=2950 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.131000 audit[3034]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=3034 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.131000 audit[3034]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc232f910 a2=0 a3=1 items=0 ppid=2950 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:22:23.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:22:23.134000 audit[3036]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.134000 audit[3036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc398f020 a2=0 a3=1 items=0 ppid=2950 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:22:23.220000 audit[3037]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.220000 audit[3037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe5366540 a2=0 a3=1 items=0 ppid=2950 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:22:23.226000 audit[3039]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.226000 audit[3039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffee80ebc0 a2=0 a3=1 items=0 ppid=2950 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:22:23.233000 audit[3042]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.233000 audit[3042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffcceae10 a2=0 a3=1 items=0 ppid=2950 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:22:23.239000 audit[3043]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.239000 audit[3043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe994e90 a2=0 a3=1 items=0 ppid=2950 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:22:23.245000 audit[3045]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.245000 audit[3045]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdccf1c30 a2=0 a3=1 items=0 ppid=2950 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:22:23.247000 audit[3046]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.247000 audit[3046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbf6a1d0 a2=0 a3=1 items=0 ppid=2950 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:22:23.252000 audit[3048]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3048 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.252000 audit[3048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffd0c0e30 a2=0 a3=1 items=0 ppid=2950 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:22:23.261000 audit[3051]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.261000 audit[3051]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd609cfb0 a2=0 a3=1 items=0 ppid=2950 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:22:23.263000 audit[3052]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.263000 audit[3052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffddf15790 a2=0 a3=1 items=0 ppid=2950 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:22:23.269000 audit[3054]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3054 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.269000 audit[3054]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe38d1dd0 a2=0 a3=1 items=0 ppid=2950 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:22:23.280000 audit[3055]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.280000 audit[3055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe58ccb00 a2=0 a3=1 items=0 ppid=2950 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:22:23.283472 systemd[1]: run-containerd-runc-k8s.io-d03f62517d6b8b5e5ed922866591d7b1086c343a5b7fe125530c0101b28f0cd1-runc.zhY2AU.mount: Deactivated successfully. Apr 12 18:22:23.290000 audit[3057]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.290000 audit[3057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffec4bfd50 a2=0 a3=1 items=0 ppid=2950 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:22:23.297000 audit[3060]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.297000 audit[3060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc85c0a0 a2=0 a3=1 items=0 ppid=2950 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:22:23.307000 audit[3063]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3063 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.307000 audit[3063]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffca7c4700 a2=0 a3=1 items=0 ppid=2950 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:22:23.309000 audit[3064]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.309000 audit[3064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdfa8ea80 a2=0 a3=1 items=0 ppid=2950 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:22:23.314000 audit[3066]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.314000 audit[3066]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc7693130 a2=0 a3=1 items=0 ppid=2950 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:22:23.322000 audit[3069]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.322000 audit[3069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc57415a0 a2=0 a3=1 items=0 ppid=2950 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:22:23.325000 audit[3070]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.325000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7f549a0 a2=0 a3=1 items=0 ppid=2950 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:22:23.330000 audit[3072]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3072 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:22:23.330000 audit[3072]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffcd252cf0 a2=0 a3=1 items=0 ppid=2950 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:22:23.367000 audit[3078]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:23.367000 audit[3078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffff241450 a2=0 a3=1 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:23.376000 audit[3078]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:23.376000 audit[3078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffff241450 a2=0 a3=1 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:23.382000 audit[3083]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.382000 audit[3083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff151ec30 a2=0 a3=1 items=0 ppid=2950 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:22:23.391000 audit[3085]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3085 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.391000 audit[3085]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcc943120 a2=0 a3=1 items=0 ppid=2950 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:22:23.398000 audit[3088]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.398000 audit[3088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffec2588a0 a2=0 a3=1 items=0 ppid=2950 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:22:23.402000 audit[3089]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3089 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.402000 audit[3089]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec499670 a2=0 a3=1 items=0 ppid=2950 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:22:23.408000 audit[3091]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3091 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.408000 audit[3091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdbe63de0 a2=0 a3=1 items=0 ppid=2950 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:22:23.410000 audit[3092]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3092 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.410000 audit[3092]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf27a5a0 a2=0 a3=1 items=0 ppid=2950 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:22:23.417000 audit[3094]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.417000 audit[3094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc45860d0 a2=0 a3=1 items=0 ppid=2950 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:22:23.425000 audit[3097]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3097 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.425000 audit[3097]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd21c4c60 a2=0 a3=1 items=0 ppid=2950 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:22:23.428000 audit[3098]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3098 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.428000 audit[3098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc6aaec0 a2=0 a3=1 items=0 ppid=2950 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:22:23.433000 audit[3100]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3100 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.433000 audit[3100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd8e77920 a2=0 a3=1 items=0 ppid=2950 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:22:23.435000 audit[3101]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3101 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.435000 audit[3101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5489640 a2=0 a3=1 items=0 ppid=2950 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:22:23.441000 audit[3103]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.441000 audit[3103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffda4f8050 a2=0 a3=1 items=0 ppid=2950 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:22:23.451000 audit[3106]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.451000 audit[3106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe47925a0 a2=0 a3=1 items=0 ppid=2950 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:22:23.458000 audit[3109]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.458000 audit[3109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd10db300 a2=0 a3=1 items=0 ppid=2950 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:22:23.460000 audit[3110]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3110 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.460000 audit[3110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd3049630 a2=0 a3=1 items=0 ppid=2950 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:22:23.465000 audit[3112]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.465000 audit[3112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe6782de0 a2=0 a3=1 items=0 ppid=2950 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:22:23.472000 audit[3115]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.472000 audit[3115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdeb4d7d0 a2=0 a3=1 items=0 ppid=2950 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:22:23.475000 audit[3116]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3116 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.475000 audit[3116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4418c90 a2=0 a3=1 items=0 ppid=2950 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:22:23.479000 audit[3118]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3118 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.479000 audit[3118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe076e040 a2=0 a3=1 items=0 ppid=2950 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.479000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:22:23.482000 audit[3119]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.482000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5ccb050 a2=0 a3=1 items=0 ppid=2950 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:22:23.487000 audit[3121]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.487000 audit[3121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd6953090 a2=0 a3=1 items=0 ppid=2950 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:22:23.496000 audit[3124]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:22:23.496000 audit[3124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffca8bc390 a2=0 a3=1 items=0 ppid=2950 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:22:23.502000 audit[3126]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:22:23.502000 audit[3126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff3e05750 a2=0 a3=1 items=0 ppid=2950 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.502000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:23.503000 audit[3126]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:22:23.503000 audit[3126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff3e05750 a2=0 a3=1 items=0 ppid=2950 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:23.503000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:24.361100 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3619374919.mount: Deactivated successfully. Apr 12 18:22:25.434087 env[1683]: time="2024-04-12T18:22:25.434022744Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:25.437166 env[1683]: time="2024-04-12T18:22:25.437105107Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:25.440468 env[1683]: time="2024-04-12T18:22:25.440414252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:25.443110 env[1683]: time="2024-04-12T18:22:25.443044828Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:25.444474 env[1683]: time="2024-04-12T18:22:25.444423723Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 18:22:25.451141 env[1683]: time="2024-04-12T18:22:25.451066145Z" level=info msg="CreateContainer within sandbox \"481133b51a1a2a387d3ce9ab416808eb38698335015a771464e283e2b7f394fb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:22:25.468756 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount261488023.mount: Deactivated successfully. Apr 12 18:22:25.481238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1156130756.mount: Deactivated successfully. Apr 12 18:22:25.489488 env[1683]: time="2024-04-12T18:22:25.489409409Z" level=info msg="CreateContainer within sandbox \"481133b51a1a2a387d3ce9ab416808eb38698335015a771464e283e2b7f394fb\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d\"" Apr 12 18:22:25.490952 env[1683]: time="2024-04-12T18:22:25.490899020Z" level=info msg="StartContainer for \"7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d\"" Apr 12 18:22:25.532113 systemd[1]: Started cri-containerd-7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d.scope. Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.561000 audit: BPF prog-id=126 op=LOAD Apr 12 18:22:25.561000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.561000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2973 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:25.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656361613266633639643864343936396435633834616637316135 Apr 12 18:22:25.561000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.561000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2973 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:25.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656361613266633639643864343936396435633834616637316135 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit: BPF prog-id=127 op=LOAD Apr 12 18:22:25.562000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2973 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:25.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656361613266633639643864343936396435633834616637316135 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit: BPF prog-id=128 op=LOAD Apr 12 18:22:25.562000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2973 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:25.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656361613266633639643864343936396435633834616637316135 Apr 12 18:22:25.562000 audit: BPF prog-id=128 op=UNLOAD Apr 12 18:22:25.562000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:25.562000 audit: BPF prog-id=129 op=LOAD Apr 12 18:22:25.562000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2973 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:25.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656361613266633639643864343936396435633834616637316135 Apr 12 18:22:25.588130 env[1683]: time="2024-04-12T18:22:25.588068297Z" level=info msg="StartContainer for \"7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d\" returns successfully" Apr 12 18:22:25.656824 kubelet[2811]: I0412 18:22:25.656776 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-tn42n" podStartSLOduration=3.6567181829999997 podCreationTimestamp="2024-04-12 18:22:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:22:23.642247533 +0000 UTC m=+13.440095364" watchObservedRunningTime="2024-04-12 18:22:25.656718183 +0000 UTC m=+15.454565990" Apr 12 18:22:29.976016 kernel: kauditd_printk_skb: 357 callbacks suppressed Apr 12 18:22:29.976238 kernel: audit: type=1325 audit(1712946149.971:1103): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:29.971000 audit[3167]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:29.971000 audit[3167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff9d9ab00 a2=0 a3=1 items=0 ppid=2950 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:29.992530 kernel: audit: type=1300 audit(1712946149.971:1103): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff9d9ab00 a2=0 a3=1 items=0 ppid=2950 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:29.992667 kernel: audit: type=1327 audit(1712946149.971:1103): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:29.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:29.975000 audit[3167]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:29.975000 audit[3167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff9d9ab00 a2=0 a3=1 items=0 ppid=2950 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.016721 kernel: audit: type=1325 audit(1712946149.975:1104): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:30.016847 kernel: audit: type=1300 audit(1712946149.975:1104): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff9d9ab00 a2=0 a3=1 items=0 ppid=2950 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:29.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:30.022396 kernel: audit: type=1327 audit(1712946149.975:1104): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:30.023000 audit[3169]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:30.030977 kernel: audit: type=1325 audit(1712946150.023:1105): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:30.031129 kernel: audit: type=1300 audit(1712946150.023:1105): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffcbdf53e0 a2=0 a3=1 items=0 ppid=2950 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.023000 audit[3169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffcbdf53e0 a2=0 a3=1 items=0 ppid=2950 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.023000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:30.047686 kernel: audit: type=1327 audit(1712946150.023:1105): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:30.025000 audit[3169]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:30.025000 audit[3169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcbdf53e0 a2=0 a3=1 items=0 ppid=2950 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:30.056900 kernel: audit: type=1325 audit(1712946150.025:1106): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:30.120644 kubelet[2811]: I0412 18:22:30.120585 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-288w5" podStartSLOduration=5.752957156 podCreationTimestamp="2024-04-12 18:22:22 +0000 UTC" firstStartedPulling="2024-04-12 18:22:23.077476734 +0000 UTC m=+12.875324541" lastFinishedPulling="2024-04-12 18:22:25.445022562 +0000 UTC m=+15.242870369" observedRunningTime="2024-04-12 18:22:25.659250896 +0000 UTC m=+15.457098691" watchObservedRunningTime="2024-04-12 18:22:30.120502984 +0000 UTC m=+19.918350827" Apr 12 18:22:30.121892 kubelet[2811]: I0412 18:22:30.121801 2811 topology_manager.go:215] "Topology Admit Handler" podUID="f001313d-e742-4816-a623-3e7130f1aaa3" podNamespace="calico-system" podName="calico-typha-599dd97dc5-dbw7b" Apr 12 18:22:30.135373 systemd[1]: Created slice kubepods-besteffort-podf001313d_e742_4816_a623_3e7130f1aaa3.slice. Apr 12 18:22:30.218435 kubelet[2811]: I0412 18:22:30.218394 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f001313d-e742-4816-a623-3e7130f1aaa3-tigera-ca-bundle\") pod \"calico-typha-599dd97dc5-dbw7b\" (UID: \"f001313d-e742-4816-a623-3e7130f1aaa3\") " pod="calico-system/calico-typha-599dd97dc5-dbw7b" Apr 12 18:22:30.218739 kubelet[2811]: I0412 18:22:30.218702 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f001313d-e742-4816-a623-3e7130f1aaa3-typha-certs\") pod \"calico-typha-599dd97dc5-dbw7b\" (UID: \"f001313d-e742-4816-a623-3e7130f1aaa3\") " pod="calico-system/calico-typha-599dd97dc5-dbw7b" Apr 12 18:22:30.219024 kubelet[2811]: I0412 18:22:30.218997 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xn94q\" (UniqueName: \"kubernetes.io/projected/f001313d-e742-4816-a623-3e7130f1aaa3-kube-api-access-xn94q\") pod \"calico-typha-599dd97dc5-dbw7b\" (UID: \"f001313d-e742-4816-a623-3e7130f1aaa3\") " pod="calico-system/calico-typha-599dd97dc5-dbw7b" Apr 12 18:22:30.290537 kubelet[2811]: I0412 18:22:30.290403 2811 topology_manager.go:215] "Topology Admit Handler" podUID="e47c5ae7-fbdb-4a39-9228-3ff002c54734" podNamespace="calico-system" podName="calico-node-cprlg" Apr 12 18:22:30.305122 systemd[1]: Created slice kubepods-besteffort-pode47c5ae7_fbdb_4a39_9228_3ff002c54734.slice. Apr 12 18:22:30.418671 kubelet[2811]: I0412 18:22:30.418609 2811 topology_manager.go:215] "Topology Admit Handler" podUID="ce963011-a06a-4b54-9ee5-38626784b783" podNamespace="calico-system" podName="csi-node-driver-wngv7" Apr 12 18:22:30.419404 kubelet[2811]: E0412 18:22:30.419337 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wngv7" podUID="ce963011-a06a-4b54-9ee5-38626784b783" Apr 12 18:22:30.419787 kubelet[2811]: I0412 18:22:30.419756 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-flexvol-driver-host\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420066 kubelet[2811]: I0412 18:22:30.420028 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e47c5ae7-fbdb-4a39-9228-3ff002c54734-tigera-ca-bundle\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420189 kubelet[2811]: I0412 18:22:30.420093 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-lib-modules\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420189 kubelet[2811]: I0412 18:22:30.420144 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-42r5n\" (UniqueName: \"kubernetes.io/projected/e47c5ae7-fbdb-4a39-9228-3ff002c54734-kube-api-access-42r5n\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420322 kubelet[2811]: I0412 18:22:30.420197 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-xtables-lock\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420322 kubelet[2811]: I0412 18:22:30.420242 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-var-run-calico\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420322 kubelet[2811]: I0412 18:22:30.420284 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-cni-log-dir\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420489 kubelet[2811]: I0412 18:22:30.420330 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-policysync\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420489 kubelet[2811]: I0412 18:22:30.420374 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-var-lib-calico\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420489 kubelet[2811]: I0412 18:22:30.420416 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e47c5ae7-fbdb-4a39-9228-3ff002c54734-node-certs\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420489 kubelet[2811]: I0412 18:22:30.420458 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-cni-bin-dir\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.420724 kubelet[2811]: I0412 18:22:30.420507 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e47c5ae7-fbdb-4a39-9228-3ff002c54734-cni-net-dir\") pod \"calico-node-cprlg\" (UID: \"e47c5ae7-fbdb-4a39-9228-3ff002c54734\") " pod="calico-system/calico-node-cprlg" Apr 12 18:22:30.447271 env[1683]: time="2024-04-12T18:22:30.446595949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-599dd97dc5-dbw7b,Uid:f001313d-e742-4816-a623-3e7130f1aaa3,Namespace:calico-system,Attempt:0,}" Apr 12 18:22:30.485971 env[1683]: time="2024-04-12T18:22:30.484216705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:30.485971 env[1683]: time="2024-04-12T18:22:30.484295510Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:30.485971 env[1683]: time="2024-04-12T18:22:30.484323075Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:30.486834 env[1683]: time="2024-04-12T18:22:30.486757761Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5a7b0569079234b73e512511bce3184a1cd4f489f23db2f073355a65263435c pid=3178 runtime=io.containerd.runc.v2 Apr 12 18:22:30.522464 kubelet[2811]: I0412 18:22:30.522045 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ce963011-a06a-4b54-9ee5-38626784b783-registration-dir\") pod \"csi-node-driver-wngv7\" (UID: \"ce963011-a06a-4b54-9ee5-38626784b783\") " pod="calico-system/csi-node-driver-wngv7" Apr 12 18:22:30.522634 kubelet[2811]: I0412 18:22:30.522584 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ce963011-a06a-4b54-9ee5-38626784b783-varrun\") pod \"csi-node-driver-wngv7\" (UID: \"ce963011-a06a-4b54-9ee5-38626784b783\") " pod="calico-system/csi-node-driver-wngv7" Apr 12 18:22:30.522726 kubelet[2811]: I0412 18:22:30.522703 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ce963011-a06a-4b54-9ee5-38626784b783-kubelet-dir\") pod \"csi-node-driver-wngv7\" (UID: \"ce963011-a06a-4b54-9ee5-38626784b783\") " pod="calico-system/csi-node-driver-wngv7" Apr 12 18:22:30.523178 kubelet[2811]: I0412 18:22:30.523041 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gthmz\" (UniqueName: \"kubernetes.io/projected/ce963011-a06a-4b54-9ee5-38626784b783-kube-api-access-gthmz\") pod \"csi-node-driver-wngv7\" (UID: \"ce963011-a06a-4b54-9ee5-38626784b783\") " pod="calico-system/csi-node-driver-wngv7" Apr 12 18:22:30.524761 kubelet[2811]: I0412 18:22:30.524407 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ce963011-a06a-4b54-9ee5-38626784b783-socket-dir\") pod \"csi-node-driver-wngv7\" (UID: \"ce963011-a06a-4b54-9ee5-38626784b783\") " pod="calico-system/csi-node-driver-wngv7" Apr 12 18:22:30.539526 systemd[1]: Started cri-containerd-d5a7b0569079234b73e512511bce3184a1cd4f489f23db2f073355a65263435c.scope. Apr 12 18:22:30.561155 kubelet[2811]: E0412 18:22:30.561106 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.561155 kubelet[2811]: W0412 18:22:30.561142 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.561422 kubelet[2811]: E0412 18:22:30.561187 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.579061 kubelet[2811]: E0412 18:22:30.579012 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.579272 kubelet[2811]: W0412 18:22:30.579068 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.579272 kubelet[2811]: E0412 18:22:30.579107 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.625788 kubelet[2811]: E0412 18:22:30.625751 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.626048 kubelet[2811]: W0412 18:22:30.626005 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.626198 kubelet[2811]: E0412 18:22:30.626174 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.627784 kubelet[2811]: E0412 18:22:30.627748 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.628030 kubelet[2811]: W0412 18:22:30.628002 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.628178 kubelet[2811]: E0412 18:22:30.628155 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.628655 kubelet[2811]: E0412 18:22:30.628601 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.628655 kubelet[2811]: W0412 18:22:30.628642 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.628919 kubelet[2811]: E0412 18:22:30.628688 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.629078 kubelet[2811]: E0412 18:22:30.629040 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.629078 kubelet[2811]: W0412 18:22:30.629070 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.629240 kubelet[2811]: E0412 18:22:30.629100 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.629428 kubelet[2811]: E0412 18:22:30.629382 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.629428 kubelet[2811]: W0412 18:22:30.629408 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.629565 kubelet[2811]: E0412 18:22:30.629546 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.629823 kubelet[2811]: E0412 18:22:30.629789 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.629823 kubelet[2811]: W0412 18:22:30.629817 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.630035 kubelet[2811]: E0412 18:22:30.630004 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.630371 kubelet[2811]: E0412 18:22:30.630332 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.630371 kubelet[2811]: W0412 18:22:30.630362 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.630582 kubelet[2811]: E0412 18:22:30.630546 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.630815 kubelet[2811]: E0412 18:22:30.630779 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.630815 kubelet[2811]: W0412 18:22:30.630809 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.631007 kubelet[2811]: E0412 18:22:30.630864 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.631297 kubelet[2811]: E0412 18:22:30.631237 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.631297 kubelet[2811]: W0412 18:22:30.631267 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.631444 kubelet[2811]: E0412 18:22:30.631309 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.631785 kubelet[2811]: E0412 18:22:30.631742 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.631785 kubelet[2811]: W0412 18:22:30.631775 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.632105 kubelet[2811]: E0412 18:22:30.632079 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.632315 kubelet[2811]: E0412 18:22:30.632134 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.632447 kubelet[2811]: W0412 18:22:30.632420 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.634446 kubelet[2811]: E0412 18:22:30.632931 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.634632 env[1683]: time="2024-04-12T18:22:30.633842094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cprlg,Uid:e47c5ae7-fbdb-4a39-9228-3ff002c54734,Namespace:calico-system,Attempt:0,}" Apr 12 18:22:30.635162 kubelet[2811]: E0412 18:22:30.635130 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.635369 kubelet[2811]: W0412 18:22:30.635339 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.636486 kubelet[2811]: E0412 18:22:30.636044 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.636486 kubelet[2811]: W0412 18:22:30.636079 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.636843 kubelet[2811]: E0412 18:22:30.636791 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.637394 kubelet[2811]: E0412 18:22:30.637334 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.639034 kubelet[2811]: E0412 18:22:30.638993 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.639034 kubelet[2811]: W0412 18:22:30.639027 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.639337 kubelet[2811]: E0412 18:22:30.639251 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.640557 kubelet[2811]: E0412 18:22:30.640048 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.640557 kubelet[2811]: W0412 18:22:30.640082 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.640557 kubelet[2811]: E0412 18:22:30.640301 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.641687 kubelet[2811]: E0412 18:22:30.641649 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.641687 kubelet[2811]: W0412 18:22:30.641682 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.648360 kubelet[2811]: E0412 18:22:30.642128 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.648360 kubelet[2811]: E0412 18:22:30.644563 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.648360 kubelet[2811]: W0412 18:22:30.644585 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.648360 kubelet[2811]: E0412 18:22:30.644650 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.648360 kubelet[2811]: E0412 18:22:30.645105 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.648360 kubelet[2811]: W0412 18:22:30.645126 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.648360 kubelet[2811]: E0412 18:22:30.645185 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.648360 kubelet[2811]: E0412 18:22:30.645729 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.648360 kubelet[2811]: W0412 18:22:30.645746 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.648360 kubelet[2811]: E0412 18:22:30.645802 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.648985 kubelet[2811]: E0412 18:22:30.646644 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.648985 kubelet[2811]: W0412 18:22:30.646668 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.649441 kubelet[2811]: E0412 18:22:30.649398 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.650149 kubelet[2811]: E0412 18:22:30.650105 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.650275 kubelet[2811]: W0412 18:22:30.650165 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.650362 kubelet[2811]: E0412 18:22:30.650272 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.652112 kubelet[2811]: E0412 18:22:30.652046 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.652289 kubelet[2811]: W0412 18:22:30.652117 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.652289 kubelet[2811]: E0412 18:22:30.652219 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.653420 kubelet[2811]: E0412 18:22:30.653343 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.653420 kubelet[2811]: W0412 18:22:30.653409 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.653629 kubelet[2811]: E0412 18:22:30.653577 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.659170 kubelet[2811]: E0412 18:22:30.659119 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.659370 kubelet[2811]: W0412 18:22:30.659175 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.659505 kubelet[2811]: E0412 18:22:30.659477 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.662081 kubelet[2811]: E0412 18:22:30.662031 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.662255 kubelet[2811]: W0412 18:22:30.662096 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.662255 kubelet[2811]: E0412 18:22:30.662137 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.670809 env[1683]: time="2024-04-12T18:22:30.670690164Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:30.671153 env[1683]: time="2024-04-12T18:22:30.671093289Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:30.671340 env[1683]: time="2024-04-12T18:22:30.671296238Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:30.671802 env[1683]: time="2024-04-12T18:22:30.671738220Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3 pid=3241 runtime=io.containerd.runc.v2 Apr 12 18:22:30.690988 kubelet[2811]: E0412 18:22:30.690554 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:30.690988 kubelet[2811]: W0412 18:22:30.690614 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:30.690988 kubelet[2811]: E0412 18:22:30.690654 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:30.718731 systemd[1]: Started cri-containerd-68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3.scope. Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.730000 audit: BPF prog-id=130 op=LOAD Apr 12 18:22:30.732000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.732000 audit[3187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3178 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613762303536393037393233346237336535313235313162636533 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3178 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613762303536393037393233346237336535313235313162636533 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.733000 audit: BPF prog-id=131 op=LOAD Apr 12 18:22:30.733000 audit[3187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3178 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613762303536393037393233346237336535313235313162636533 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.734000 audit: BPF prog-id=132 op=LOAD Apr 12 18:22:30.734000 audit[3187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3178 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613762303536393037393233346237336535313235313162636533 Apr 12 18:22:30.734000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:22:30.735000 audit: BPF prog-id=131 op=UNLOAD Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.735000 audit: BPF prog-id=133 op=LOAD Apr 12 18:22:30.735000 audit[3187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3178 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613762303536393037393233346237336535313235313162636533 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.816000 audit: BPF prog-id=134 op=LOAD Apr 12 18:22:30.827000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.827000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3241 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353635633761363566326462376136353062366562353865316466 Apr 12 18:22:30.827000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.827000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3241 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353635633761363566326462376136353062366562353865316466 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.828000 audit: BPF prog-id=135 op=LOAD Apr 12 18:22:30.828000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3241 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353635633761363566326462376136353062366562353865316466 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit: BPF prog-id=136 op=LOAD Apr 12 18:22:30.833000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3241 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353635633761363566326462376136353062366562353865316466 Apr 12 18:22:30.833000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:22:30.833000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:30.833000 audit: BPF prog-id=137 op=LOAD Apr 12 18:22:30.833000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3241 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:30.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353635633761363566326462376136353062366562353865316466 Apr 12 18:22:30.840113 env[1683]: time="2024-04-12T18:22:30.840017425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-599dd97dc5-dbw7b,Uid:f001313d-e742-4816-a623-3e7130f1aaa3,Namespace:calico-system,Attempt:0,} returns sandbox id \"d5a7b0569079234b73e512511bce3184a1cd4f489f23db2f073355a65263435c\"" Apr 12 18:22:30.847770 env[1683]: time="2024-04-12T18:22:30.847649944Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:22:30.907404 env[1683]: time="2024-04-12T18:22:30.907346680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cprlg,Uid:e47c5ae7-fbdb-4a39-9228-3ff002c54734,Namespace:calico-system,Attempt:0,} returns sandbox id \"68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3\"" Apr 12 18:22:31.067000 audit[3287]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:31.067000 audit[3287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd4105da0 a2=0 a3=1 items=0 ppid=2950 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:31.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:31.069000 audit[3287]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:31.069000 audit[3287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd4105da0 a2=0 a3=1 items=0 ppid=2950 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:31.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:31.981780 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2176784840.mount: Deactivated successfully. Apr 12 18:22:32.552299 kubelet[2811]: E0412 18:22:32.552232 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wngv7" podUID="ce963011-a06a-4b54-9ee5-38626784b783" Apr 12 18:22:33.322295 env[1683]: time="2024-04-12T18:22:33.322217886Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:33.326617 env[1683]: time="2024-04-12T18:22:33.326545572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:33.330878 env[1683]: time="2024-04-12T18:22:33.330777484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:33.336367 env[1683]: time="2024-04-12T18:22:33.336305027Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:33.337680 env[1683]: time="2024-04-12T18:22:33.337631655Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 18:22:33.340646 env[1683]: time="2024-04-12T18:22:33.340321919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:22:33.379936 env[1683]: time="2024-04-12T18:22:33.378043083Z" level=info msg="CreateContainer within sandbox \"d5a7b0569079234b73e512511bce3184a1cd4f489f23db2f073355a65263435c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:22:33.410137 env[1683]: time="2024-04-12T18:22:33.410058584Z" level=info msg="CreateContainer within sandbox \"d5a7b0569079234b73e512511bce3184a1cd4f489f23db2f073355a65263435c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"78adf49fe0a6223546e773a6f3f950ab96232181fc117bb659731555ec0048cc\"" Apr 12 18:22:33.411272 env[1683]: time="2024-04-12T18:22:33.411174379Z" level=info msg="StartContainer for \"78adf49fe0a6223546e773a6f3f950ab96232181fc117bb659731555ec0048cc\"" Apr 12 18:22:33.481239 systemd[1]: Started cri-containerd-78adf49fe0a6223546e773a6f3f950ab96232181fc117bb659731555ec0048cc.scope. Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.541000 audit: BPF prog-id=138 op=LOAD Apr 12 18:22:33.543000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.543000 audit[3297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3178 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:33.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738616466343966653061363232333534366537373361366633663935 Apr 12 18:22:33.543000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.543000 audit[3297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3178 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:33.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738616466343966653061363232333534366537373361366633663935 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit: BPF prog-id=139 op=LOAD Apr 12 18:22:33.544000 audit[3297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3178 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:33.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738616466343966653061363232333534366537373361366633663935 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit: BPF prog-id=140 op=LOAD Apr 12 18:22:33.544000 audit[3297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3178 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:33.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738616466343966653061363232333534366537373361366633663935 Apr 12 18:22:33.544000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:22:33.544000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:33.544000 audit: BPF prog-id=141 op=LOAD Apr 12 18:22:33.544000 audit[3297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3178 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:33.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738616466343966653061363232333534366537373361366633663935 Apr 12 18:22:33.659551 env[1683]: time="2024-04-12T18:22:33.656167320Z" level=info msg="StartContainer for \"78adf49fe0a6223546e773a6f3f950ab96232181fc117bb659731555ec0048cc\" returns successfully" Apr 12 18:22:33.705585 kubelet[2811]: I0412 18:22:33.705532 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-599dd97dc5-dbw7b" podStartSLOduration=1.210679037 podCreationTimestamp="2024-04-12 18:22:30 +0000 UTC" firstStartedPulling="2024-04-12 18:22:30.844625012 +0000 UTC m=+20.642472855" lastFinishedPulling="2024-04-12 18:22:33.339393771 +0000 UTC m=+23.137241590" observedRunningTime="2024-04-12 18:22:33.705359595 +0000 UTC m=+23.503207450" watchObservedRunningTime="2024-04-12 18:22:33.705447772 +0000 UTC m=+23.503295603" Apr 12 18:22:33.719327 kubelet[2811]: E0412 18:22:33.719253 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.719327 kubelet[2811]: W0412 18:22:33.719304 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.719578 kubelet[2811]: E0412 18:22:33.719342 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.721055 kubelet[2811]: E0412 18:22:33.720996 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.721055 kubelet[2811]: W0412 18:22:33.721032 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.721301 kubelet[2811]: E0412 18:22:33.721071 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.721496 kubelet[2811]: E0412 18:22:33.721462 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.721496 kubelet[2811]: W0412 18:22:33.721489 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.721655 kubelet[2811]: E0412 18:22:33.721517 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.721898 kubelet[2811]: E0412 18:22:33.721846 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.721898 kubelet[2811]: W0412 18:22:33.721889 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.722080 kubelet[2811]: E0412 18:22:33.721915 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.723108 kubelet[2811]: E0412 18:22:33.723062 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.723285 kubelet[2811]: W0412 18:22:33.723097 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.723285 kubelet[2811]: E0412 18:22:33.723147 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.723568 kubelet[2811]: E0412 18:22:33.723535 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.723568 kubelet[2811]: W0412 18:22:33.723563 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.723741 kubelet[2811]: E0412 18:22:33.723590 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.723980 kubelet[2811]: E0412 18:22:33.723937 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.723980 kubelet[2811]: W0412 18:22:33.723966 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.724135 kubelet[2811]: E0412 18:22:33.723996 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.724324 kubelet[2811]: E0412 18:22:33.724292 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.724324 kubelet[2811]: W0412 18:22:33.724318 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.724512 kubelet[2811]: E0412 18:22:33.724343 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.725184 kubelet[2811]: E0412 18:22:33.725143 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.725184 kubelet[2811]: W0412 18:22:33.725177 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.725373 kubelet[2811]: E0412 18:22:33.725212 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.725587 kubelet[2811]: E0412 18:22:33.725554 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.725587 kubelet[2811]: W0412 18:22:33.725580 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.725775 kubelet[2811]: E0412 18:22:33.725607 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.726015 kubelet[2811]: E0412 18:22:33.725975 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.726015 kubelet[2811]: W0412 18:22:33.726001 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.726174 kubelet[2811]: E0412 18:22:33.726028 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.726362 kubelet[2811]: E0412 18:22:33.726331 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.726362 kubelet[2811]: W0412 18:22:33.726355 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.726536 kubelet[2811]: E0412 18:22:33.726382 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.726741 kubelet[2811]: E0412 18:22:33.726709 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.726741 kubelet[2811]: W0412 18:22:33.726734 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.726966 kubelet[2811]: E0412 18:22:33.726760 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.727106 kubelet[2811]: E0412 18:22:33.727072 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.727106 kubelet[2811]: W0412 18:22:33.727098 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.727252 kubelet[2811]: E0412 18:22:33.727127 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.727477 kubelet[2811]: E0412 18:22:33.727440 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.727477 kubelet[2811]: W0412 18:22:33.727467 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.727618 kubelet[2811]: E0412 18:22:33.727493 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.753220 kubelet[2811]: E0412 18:22:33.753184 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.753456 kubelet[2811]: W0412 18:22:33.753427 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.753611 kubelet[2811]: E0412 18:22:33.753589 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.754248 kubelet[2811]: E0412 18:22:33.754219 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.754428 kubelet[2811]: W0412 18:22:33.754402 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.754711 kubelet[2811]: E0412 18:22:33.754676 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.755166 kubelet[2811]: E0412 18:22:33.755125 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.755166 kubelet[2811]: W0412 18:22:33.755157 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.755385 kubelet[2811]: E0412 18:22:33.755203 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.755581 kubelet[2811]: E0412 18:22:33.755547 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.755581 kubelet[2811]: W0412 18:22:33.755574 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.755722 kubelet[2811]: E0412 18:22:33.755617 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.755944 kubelet[2811]: E0412 18:22:33.755908 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.755944 kubelet[2811]: W0412 18:22:33.755935 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.756122 kubelet[2811]: E0412 18:22:33.755962 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.756361 kubelet[2811]: E0412 18:22:33.756325 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.756361 kubelet[2811]: W0412 18:22:33.756352 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.756592 kubelet[2811]: E0412 18:22:33.756568 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.756920 kubelet[2811]: E0412 18:22:33.756638 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.757070 kubelet[2811]: W0412 18:22:33.757044 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.757594 kubelet[2811]: E0412 18:22:33.757570 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.757742 kubelet[2811]: W0412 18:22:33.757717 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.757946 kubelet[2811]: E0412 18:22:33.757910 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.758095 kubelet[2811]: E0412 18:22:33.757925 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.758371 kubelet[2811]: E0412 18:22:33.758329 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.758371 kubelet[2811]: W0412 18:22:33.758355 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.758503 kubelet[2811]: E0412 18:22:33.758387 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.758898 kubelet[2811]: E0412 18:22:33.758660 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.758898 kubelet[2811]: W0412 18:22:33.758687 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.758898 kubelet[2811]: E0412 18:22:33.758714 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.759133 kubelet[2811]: E0412 18:22:33.759043 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.759133 kubelet[2811]: W0412 18:22:33.759061 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.759133 kubelet[2811]: E0412 18:22:33.759088 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.760588 kubelet[2811]: E0412 18:22:33.759416 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.760588 kubelet[2811]: W0412 18:22:33.759443 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.760588 kubelet[2811]: E0412 18:22:33.759736 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.760588 kubelet[2811]: W0412 18:22:33.759753 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.760588 kubelet[2811]: E0412 18:22:33.759781 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.760588 kubelet[2811]: E0412 18:22:33.760189 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.760588 kubelet[2811]: W0412 18:22:33.760210 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.760588 kubelet[2811]: E0412 18:22:33.760236 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.760588 kubelet[2811]: E0412 18:22:33.760548 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.760588 kubelet[2811]: W0412 18:22:33.760567 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.761374 kubelet[2811]: E0412 18:22:33.760602 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.761374 kubelet[2811]: E0412 18:22:33.760956 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.761374 kubelet[2811]: W0412 18:22:33.760973 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.761374 kubelet[2811]: E0412 18:22:33.760998 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.761726 kubelet[2811]: E0412 18:22:33.761696 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.762603 kubelet[2811]: E0412 18:22:33.762554 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.762603 kubelet[2811]: W0412 18:22:33.762590 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.762797 kubelet[2811]: E0412 18:22:33.762625 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:33.764017 kubelet[2811]: E0412 18:22:33.763957 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:33.764380 kubelet[2811]: W0412 18:22:33.764238 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:33.764561 kubelet[2811]: E0412 18:22:33.764538 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.351628 systemd[1]: run-containerd-runc-k8s.io-78adf49fe0a6223546e773a6f3f950ab96232181fc117bb659731555ec0048cc-runc.TKbAxg.mount: Deactivated successfully. Apr 12 18:22:34.553349 kubelet[2811]: E0412 18:22:34.553292 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wngv7" podUID="ce963011-a06a-4b54-9ee5-38626784b783" Apr 12 18:22:34.683886 kubelet[2811]: I0412 18:22:34.683817 2811 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:22:34.722289 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4273012441.mount: Deactivated successfully. Apr 12 18:22:34.734759 kubelet[2811]: E0412 18:22:34.734710 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.734759 kubelet[2811]: W0412 18:22:34.734748 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.735632 kubelet[2811]: E0412 18:22:34.734785 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.736252 kubelet[2811]: E0412 18:22:34.736143 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.736252 kubelet[2811]: W0412 18:22:34.736178 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.736252 kubelet[2811]: E0412 18:22:34.736215 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.736636 kubelet[2811]: E0412 18:22:34.736608 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.736727 kubelet[2811]: W0412 18:22:34.736636 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.736727 kubelet[2811]: E0412 18:22:34.736664 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.738329 kubelet[2811]: E0412 18:22:34.738010 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.738329 kubelet[2811]: W0412 18:22:34.738042 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.738329 kubelet[2811]: E0412 18:22:34.738080 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.739146 kubelet[2811]: E0412 18:22:34.738842 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.739146 kubelet[2811]: W0412 18:22:34.738919 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.739146 kubelet[2811]: E0412 18:22:34.738955 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.739961 kubelet[2811]: E0412 18:22:34.739522 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.739961 kubelet[2811]: W0412 18:22:34.739548 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.739961 kubelet[2811]: E0412 18:22:34.739578 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.740624 kubelet[2811]: E0412 18:22:34.740377 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.740624 kubelet[2811]: W0412 18:22:34.740406 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.740624 kubelet[2811]: E0412 18:22:34.740438 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.741415 kubelet[2811]: E0412 18:22:34.741052 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.741415 kubelet[2811]: W0412 18:22:34.741077 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.741415 kubelet[2811]: E0412 18:22:34.741107 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.742233 kubelet[2811]: E0412 18:22:34.741979 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.742233 kubelet[2811]: W0412 18:22:34.742008 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.742233 kubelet[2811]: E0412 18:22:34.742048 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.743180 kubelet[2811]: E0412 18:22:34.742843 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.743180 kubelet[2811]: W0412 18:22:34.742944 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.743180 kubelet[2811]: E0412 18:22:34.742978 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.743798 kubelet[2811]: E0412 18:22:34.743568 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.743798 kubelet[2811]: W0412 18:22:34.743594 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.743798 kubelet[2811]: E0412 18:22:34.743628 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.744404 kubelet[2811]: E0412 18:22:34.744161 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.744404 kubelet[2811]: W0412 18:22:34.744186 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.744404 kubelet[2811]: E0412 18:22:34.744219 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.745058 kubelet[2811]: E0412 18:22:34.744769 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.745058 kubelet[2811]: W0412 18:22:34.744794 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.745058 kubelet[2811]: E0412 18:22:34.744822 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.745577 kubelet[2811]: E0412 18:22:34.745363 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.745577 kubelet[2811]: W0412 18:22:34.745388 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.745577 kubelet[2811]: E0412 18:22:34.745418 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.746005 kubelet[2811]: E0412 18:22:34.745979 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.746550 kubelet[2811]: W0412 18:22:34.746510 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.746727 kubelet[2811]: E0412 18:22:34.746704 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.765834 kubelet[2811]: E0412 18:22:34.765772 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.765834 kubelet[2811]: W0412 18:22:34.765810 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.765834 kubelet[2811]: E0412 18:22:34.765875 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.766786 kubelet[2811]: E0412 18:22:34.766295 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.766786 kubelet[2811]: W0412 18:22:34.766326 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.766786 kubelet[2811]: E0412 18:22:34.766356 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.768110 kubelet[2811]: E0412 18:22:34.768065 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.768110 kubelet[2811]: W0412 18:22:34.768099 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.768334 kubelet[2811]: E0412 18:22:34.768138 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.768767 kubelet[2811]: E0412 18:22:34.768557 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.768767 kubelet[2811]: W0412 18:22:34.768588 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.768767 kubelet[2811]: E0412 18:22:34.768617 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.769995 kubelet[2811]: E0412 18:22:34.769897 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.769995 kubelet[2811]: W0412 18:22:34.769929 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.770302 kubelet[2811]: E0412 18:22:34.770272 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.770488 kubelet[2811]: E0412 18:22:34.770279 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.770618 kubelet[2811]: W0412 18:22:34.770589 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.771314 kubelet[2811]: E0412 18:22:34.771213 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.771944 kubelet[2811]: E0412 18:22:34.771628 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.772147 kubelet[2811]: W0412 18:22:34.772113 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.772450 kubelet[2811]: E0412 18:22:34.772425 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.775120 kubelet[2811]: E0412 18:22:34.775068 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.775493 kubelet[2811]: W0412 18:22:34.775403 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.775949 kubelet[2811]: E0412 18:22:34.775921 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.776361 kubelet[2811]: E0412 18:22:34.776333 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.776557 kubelet[2811]: W0412 18:22:34.776508 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.776758 kubelet[2811]: E0412 18:22:34.776720 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.777355 kubelet[2811]: E0412 18:22:34.777325 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.777540 kubelet[2811]: W0412 18:22:34.777512 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.779753 kubelet[2811]: E0412 18:22:34.779693 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.780225 kubelet[2811]: E0412 18:22:34.780199 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.780468 kubelet[2811]: W0412 18:22:34.780437 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.780781 kubelet[2811]: E0412 18:22:34.780756 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.781763 kubelet[2811]: E0412 18:22:34.781730 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.782033 kubelet[2811]: W0412 18:22:34.782003 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.782796 kubelet[2811]: E0412 18:22:34.782730 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.783222 kubelet[2811]: E0412 18:22:34.783179 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.783384 kubelet[2811]: W0412 18:22:34.783353 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.783823 kubelet[2811]: E0412 18:22:34.783796 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.784184 kubelet[2811]: E0412 18:22:34.784159 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.787997 kubelet[2811]: W0412 18:22:34.787938 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.788279 kubelet[2811]: E0412 18:22:34.788236 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.790054 kubelet[2811]: E0412 18:22:34.790021 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.790393 kubelet[2811]: W0412 18:22:34.790336 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.790596 kubelet[2811]: E0412 18:22:34.790558 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.791112 kubelet[2811]: E0412 18:22:34.791084 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.791273 kubelet[2811]: W0412 18:22:34.791245 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.791524 kubelet[2811]: E0412 18:22:34.791499 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.793103 kubelet[2811]: E0412 18:22:34.793029 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.793330 kubelet[2811]: W0412 18:22:34.793299 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.793484 kubelet[2811]: E0412 18:22:34.793459 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.794089 kubelet[2811]: E0412 18:22:34.794057 2811 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:22:34.794273 kubelet[2811]: W0412 18:22:34.794244 2811 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:22:34.794415 kubelet[2811]: E0412 18:22:34.794392 2811 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:22:34.908703 env[1683]: time="2024-04-12T18:22:34.908651174Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:34.913709 env[1683]: time="2024-04-12T18:22:34.913657567Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:34.918108 env[1683]: time="2024-04-12T18:22:34.918017796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:34.923602 env[1683]: time="2024-04-12T18:22:34.923546536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:34.926563 env[1683]: time="2024-04-12T18:22:34.925400490Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:22:34.930060 env[1683]: time="2024-04-12T18:22:34.929991436Z" level=info msg="CreateContainer within sandbox \"68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:22:34.954095 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2387937995.mount: Deactivated successfully. Apr 12 18:22:34.968991 env[1683]: time="2024-04-12T18:22:34.968923827Z" level=info msg="CreateContainer within sandbox \"68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c1bc7c38473d44e15f53b3549631ceb5868d9ff9707f2220ee21164de16f40e7\"" Apr 12 18:22:34.970351 env[1683]: time="2024-04-12T18:22:34.970297579Z" level=info msg="StartContainer for \"c1bc7c38473d44e15f53b3549631ceb5868d9ff9707f2220ee21164de16f40e7\"" Apr 12 18:22:35.007495 systemd[1]: Started cri-containerd-c1bc7c38473d44e15f53b3549631ceb5868d9ff9707f2220ee21164de16f40e7.scope. Apr 12 18:22:35.065000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068774 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:22:35.068885 kernel: audit: type=1400 audit(1712946155.065:1163): avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.065000 audit[3401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3241 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:35.088487 kernel: audit: type=1300 audit(1712946155.065:1163): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3241 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:35.088630 kernel: audit: type=1327 audit(1712946155.065:1163): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626337633338343733643434653135663533623335343936333163 Apr 12 18:22:35.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626337633338343733643434653135663533623335343936333163 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.111324 kernel: audit: type=1400 audit(1712946155.066:1164): avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.120385 kernel: audit: type=1400 audit(1712946155.066:1164): avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.132068 kernel: audit: type=1400 audit(1712946155.066:1164): avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.132963 kernel: audit: type=1400 audit(1712946155.066:1164): avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.147976 kernel: audit: type=1400 audit(1712946155.066:1164): avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.157504 kernel: audit: type=1400 audit(1712946155.066:1164): avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.157629 kernel: audit: type=1400 audit(1712946155.066:1164): avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.066000 audit: BPF prog-id=142 op=LOAD Apr 12 18:22:35.066000 audit[3401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3241 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:35.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626337633338343733643434653135663533623335343936333163 Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.167508 env[1683]: time="2024-04-12T18:22:35.167440794Z" level=info msg="StartContainer for \"c1bc7c38473d44e15f53b3549631ceb5868d9ff9707f2220ee21164de16f40e7\" returns successfully" Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.068000 audit: BPF prog-id=143 op=LOAD Apr 12 18:22:35.068000 audit[3401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3241 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:35.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626337633338343733643434653135663533623335343936333163 Apr 12 18:22:35.076000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:22:35.076000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { perfmon } for pid=3401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit[3401]: AVC avc: denied { bpf } for pid=3401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:35.076000 audit: BPF prog-id=144 op=LOAD Apr 12 18:22:35.076000 audit[3401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3241 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:35.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626337633338343733643434653135663533623335343936333163 Apr 12 18:22:35.237571 systemd[1]: cri-containerd-c1bc7c38473d44e15f53b3549631ceb5868d9ff9707f2220ee21164de16f40e7.scope: Deactivated successfully. Apr 12 18:22:35.240000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:22:35.720233 env[1683]: time="2024-04-12T18:22:35.720159932Z" level=info msg="shim disconnected" id=c1bc7c38473d44e15f53b3549631ceb5868d9ff9707f2220ee21164de16f40e7 Apr 12 18:22:35.720710 env[1683]: time="2024-04-12T18:22:35.720657450Z" level=warning msg="cleaning up after shim disconnected" id=c1bc7c38473d44e15f53b3549631ceb5868d9ff9707f2220ee21164de16f40e7 namespace=k8s.io Apr 12 18:22:35.720879 env[1683]: time="2024-04-12T18:22:35.720830229Z" level=info msg="cleaning up dead shim" Apr 12 18:22:35.747033 env[1683]: time="2024-04-12T18:22:35.746969978Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:22:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3441 runtime=io.containerd.runc.v2\n" Apr 12 18:22:36.550102 kubelet[2811]: E0412 18:22:36.550050 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wngv7" podUID="ce963011-a06a-4b54-9ee5-38626784b783" Apr 12 18:22:36.698452 env[1683]: time="2024-04-12T18:22:36.698384575Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:22:37.752923 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2825563458.mount: Deactivated successfully. Apr 12 18:22:38.552119 kubelet[2811]: E0412 18:22:38.552079 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wngv7" podUID="ce963011-a06a-4b54-9ee5-38626784b783" Apr 12 18:22:40.551084 kubelet[2811]: E0412 18:22:40.551026 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wngv7" podUID="ce963011-a06a-4b54-9ee5-38626784b783" Apr 12 18:22:41.256612 env[1683]: time="2024-04-12T18:22:41.256553776Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:41.260131 env[1683]: time="2024-04-12T18:22:41.260082775Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:41.264983 env[1683]: time="2024-04-12T18:22:41.264929122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:41.269150 env[1683]: time="2024-04-12T18:22:41.269105281Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:41.270562 env[1683]: time="2024-04-12T18:22:41.270507014Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:22:41.278488 env[1683]: time="2024-04-12T18:22:41.278432543Z" level=info msg="CreateContainer within sandbox \"68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:22:41.303990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount228782510.mount: Deactivated successfully. Apr 12 18:22:41.311696 env[1683]: time="2024-04-12T18:22:41.311630177Z" level=info msg="CreateContainer within sandbox \"68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df\"" Apr 12 18:22:41.314287 env[1683]: time="2024-04-12T18:22:41.314207727Z" level=info msg="StartContainer for \"806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df\"" Apr 12 18:22:41.360685 systemd[1]: Started cri-containerd-806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df.scope. Apr 12 18:22:41.374823 systemd[1]: run-containerd-runc-k8s.io-806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df-runc.wdU9VM.mount: Deactivated successfully. Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415916 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:22:41.416017 kernel: audit: type=1400 audit(1712946161.412:1170): avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3241 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:41.434382 kernel: audit: type=1300 audit(1712946161.412:1170): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3241 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:41.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830363034313830386432383961373265666333326663303231356566 Apr 12 18:22:41.444557 kernel: audit: type=1327 audit(1712946161.412:1170): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830363034313830386432383961373265666333326663303231356566 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.456891 kernel: audit: type=1400 audit(1712946161.412:1171): avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.472704 kernel: audit: type=1400 audit(1712946161.412:1171): avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.473227 kernel: audit: type=1400 audit(1712946161.412:1171): avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.482647 kernel: audit: type=1400 audit(1712946161.412:1171): avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.491887 kernel: audit: type=1400 audit(1712946161.412:1171): avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.499745 kernel: audit: type=1400 audit(1712946161.412:1171): avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.508133 kernel: audit: type=1400 audit(1712946161.412:1171): avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.412000 audit: BPF prog-id=145 op=LOAD Apr 12 18:22:41.412000 audit[3467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3241 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:41.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830363034313830386432383961373265666333326663303231356566 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.415000 audit: BPF prog-id=146 op=LOAD Apr 12 18:22:41.415000 audit[3467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3241 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:41.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830363034313830386432383961373265666333326663303231356566 Apr 12 18:22:41.422000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:22:41.422000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:41.422000 audit: BPF prog-id=147 op=LOAD Apr 12 18:22:41.422000 audit[3467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3241 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:41.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830363034313830386432383961373265666333326663303231356566 Apr 12 18:22:41.512671 env[1683]: time="2024-04-12T18:22:41.508604734Z" level=info msg="StartContainer for \"806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df\" returns successfully" Apr 12 18:22:42.319582 env[1683]: time="2024-04-12T18:22:42.319488616Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:22:42.324806 systemd[1]: cri-containerd-806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df.scope: Deactivated successfully. Apr 12 18:22:42.329000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:22:42.362768 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df-rootfs.mount: Deactivated successfully. Apr 12 18:22:42.378576 kubelet[2811]: I0412 18:22:42.378532 2811 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:22:42.425998 kubelet[2811]: I0412 18:22:42.425938 2811 topology_manager.go:215] "Topology Admit Handler" podUID="1aa19cd7-6a86-477a-90ff-765d2bfdd6e5" podNamespace="kube-system" podName="coredns-5dd5756b68-whkwp" Apr 12 18:22:42.441121 systemd[1]: Created slice kubepods-burstable-pod1aa19cd7_6a86_477a_90ff_765d2bfdd6e5.slice. Apr 12 18:22:42.452816 kubelet[2811]: I0412 18:22:42.452755 2811 topology_manager.go:215] "Topology Admit Handler" podUID="1225ba6e-932a-4758-bbf2-c64178ccc2b7" podNamespace="kube-system" podName="coredns-5dd5756b68-hrv7v" Apr 12 18:22:42.453667 kubelet[2811]: I0412 18:22:42.453197 2811 topology_manager.go:215] "Topology Admit Handler" podUID="9dac466c-3a63-43bb-b8a0-d0ba6fb9964d" podNamespace="calico-system" podName="calico-kube-controllers-565468c6d7-76w2z" Apr 12 18:22:42.470981 systemd[1]: Created slice kubepods-burstable-pod1225ba6e_932a_4758_bbf2_c64178ccc2b7.slice. Apr 12 18:22:42.490635 systemd[1]: Created slice kubepods-besteffort-pod9dac466c_3a63_43bb_b8a0_d0ba6fb9964d.slice. Apr 12 18:22:42.534240 kubelet[2811]: I0412 18:22:42.533669 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9dac466c-3a63-43bb-b8a0-d0ba6fb9964d-tigera-ca-bundle\") pod \"calico-kube-controllers-565468c6d7-76w2z\" (UID: \"9dac466c-3a63-43bb-b8a0-d0ba6fb9964d\") " pod="calico-system/calico-kube-controllers-565468c6d7-76w2z" Apr 12 18:22:42.534240 kubelet[2811]: I0412 18:22:42.533751 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1225ba6e-932a-4758-bbf2-c64178ccc2b7-config-volume\") pod \"coredns-5dd5756b68-hrv7v\" (UID: \"1225ba6e-932a-4758-bbf2-c64178ccc2b7\") " pod="kube-system/coredns-5dd5756b68-hrv7v" Apr 12 18:22:42.534240 kubelet[2811]: I0412 18:22:42.533831 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1aa19cd7-6a86-477a-90ff-765d2bfdd6e5-config-volume\") pod \"coredns-5dd5756b68-whkwp\" (UID: \"1aa19cd7-6a86-477a-90ff-765d2bfdd6e5\") " pod="kube-system/coredns-5dd5756b68-whkwp" Apr 12 18:22:42.534240 kubelet[2811]: I0412 18:22:42.533905 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ccqqv\" (UniqueName: \"kubernetes.io/projected/1aa19cd7-6a86-477a-90ff-765d2bfdd6e5-kube-api-access-ccqqv\") pod \"coredns-5dd5756b68-whkwp\" (UID: \"1aa19cd7-6a86-477a-90ff-765d2bfdd6e5\") " pod="kube-system/coredns-5dd5756b68-whkwp" Apr 12 18:22:42.534240 kubelet[2811]: I0412 18:22:42.533973 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xvqcn\" (UniqueName: \"kubernetes.io/projected/1225ba6e-932a-4758-bbf2-c64178ccc2b7-kube-api-access-xvqcn\") pod \"coredns-5dd5756b68-hrv7v\" (UID: \"1225ba6e-932a-4758-bbf2-c64178ccc2b7\") " pod="kube-system/coredns-5dd5756b68-hrv7v" Apr 12 18:22:42.534919 kubelet[2811]: I0412 18:22:42.534022 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-74thn\" (UniqueName: \"kubernetes.io/projected/9dac466c-3a63-43bb-b8a0-d0ba6fb9964d-kube-api-access-74thn\") pod \"calico-kube-controllers-565468c6d7-76w2z\" (UID: \"9dac466c-3a63-43bb-b8a0-d0ba6fb9964d\") " pod="calico-system/calico-kube-controllers-565468c6d7-76w2z" Apr 12 18:22:42.563558 systemd[1]: Created slice kubepods-besteffort-podce963011_a06a_4b54_9ee5_38626784b783.slice. Apr 12 18:22:42.570108 env[1683]: time="2024-04-12T18:22:42.569898345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wngv7,Uid:ce963011-a06a-4b54-9ee5-38626784b783,Namespace:calico-system,Attempt:0,}" Apr 12 18:22:42.750605 env[1683]: time="2024-04-12T18:22:42.750287142Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-whkwp,Uid:1aa19cd7-6a86-477a-90ff-765d2bfdd6e5,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:42.781168 env[1683]: time="2024-04-12T18:22:42.781098248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hrv7v,Uid:1225ba6e-932a-4758-bbf2-c64178ccc2b7,Namespace:kube-system,Attempt:0,}" Apr 12 18:22:42.797927 env[1683]: time="2024-04-12T18:22:42.797736481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565468c6d7-76w2z,Uid:9dac466c-3a63-43bb-b8a0-d0ba6fb9964d,Namespace:calico-system,Attempt:0,}" Apr 12 18:22:43.132577 env[1683]: time="2024-04-12T18:22:43.132509306Z" level=info msg="shim disconnected" id=806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df Apr 12 18:22:43.132776 env[1683]: time="2024-04-12T18:22:43.132576928Z" level=warning msg="cleaning up after shim disconnected" id=806041808d289a72efc32fc0215eff023d8e706fe41a892a1d7c52da63ded3df namespace=k8s.io Apr 12 18:22:43.132776 env[1683]: time="2024-04-12T18:22:43.132599368Z" level=info msg="cleaning up dead shim" Apr 12 18:22:43.175810 env[1683]: time="2024-04-12T18:22:43.175728596Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:22:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3511 runtime=io.containerd.runc.v2\n" Apr 12 18:22:43.373266 env[1683]: time="2024-04-12T18:22:43.373168503Z" level=error msg="Failed to destroy network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.383526 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186-shm.mount: Deactivated successfully. Apr 12 18:22:43.387490 env[1683]: time="2024-04-12T18:22:43.384644530Z" level=error msg="encountered an error cleaning up failed sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.387490 env[1683]: time="2024-04-12T18:22:43.384746976Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wngv7,Uid:ce963011-a06a-4b54-9ee5-38626784b783,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.389571 kubelet[2811]: E0412 18:22:43.389508 2811 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.390185 kubelet[2811]: E0412 18:22:43.389663 2811 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wngv7" Apr 12 18:22:43.390185 kubelet[2811]: E0412 18:22:43.389747 2811 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wngv7" Apr 12 18:22:43.390185 kubelet[2811]: E0412 18:22:43.389949 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wngv7_calico-system(ce963011-a06a-4b54-9ee5-38626784b783)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wngv7_calico-system(ce963011-a06a-4b54-9ee5-38626784b783)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wngv7" podUID="ce963011-a06a-4b54-9ee5-38626784b783" Apr 12 18:22:43.433031 env[1683]: time="2024-04-12T18:22:43.432937460Z" level=error msg="Failed to destroy network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.436915 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4-shm.mount: Deactivated successfully. Apr 12 18:22:43.439001 env[1683]: time="2024-04-12T18:22:43.438925588Z" level=error msg="encountered an error cleaning up failed sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.439272 env[1683]: time="2024-04-12T18:22:43.439205361Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hrv7v,Uid:1225ba6e-932a-4758-bbf2-c64178ccc2b7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.442507 kubelet[2811]: E0412 18:22:43.442423 2811 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.442678 kubelet[2811]: E0412 18:22:43.442562 2811 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-hrv7v" Apr 12 18:22:43.442678 kubelet[2811]: E0412 18:22:43.442606 2811 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-hrv7v" Apr 12 18:22:43.442900 kubelet[2811]: E0412 18:22:43.442833 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-hrv7v_kube-system(1225ba6e-932a-4758-bbf2-c64178ccc2b7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-hrv7v_kube-system(1225ba6e-932a-4758-bbf2-c64178ccc2b7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-hrv7v" podUID="1225ba6e-932a-4758-bbf2-c64178ccc2b7" Apr 12 18:22:43.446015 env[1683]: time="2024-04-12T18:22:43.445936686Z" level=error msg="Failed to destroy network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.451917 env[1683]: time="2024-04-12T18:22:43.451397657Z" level=error msg="encountered an error cleaning up failed sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.451917 env[1683]: time="2024-04-12T18:22:43.451520719Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-whkwp,Uid:1aa19cd7-6a86-477a-90ff-765d2bfdd6e5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.456065 kubelet[2811]: E0412 18:22:43.452788 2811 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.456065 kubelet[2811]: E0412 18:22:43.452936 2811 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-whkwp" Apr 12 18:22:43.456065 kubelet[2811]: E0412 18:22:43.453043 2811 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-whkwp" Apr 12 18:22:43.454278 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef-shm.mount: Deactivated successfully. Apr 12 18:22:43.456465 kubelet[2811]: E0412 18:22:43.453147 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-whkwp_kube-system(1aa19cd7-6a86-477a-90ff-765d2bfdd6e5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-whkwp_kube-system(1aa19cd7-6a86-477a-90ff-765d2bfdd6e5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-whkwp" podUID="1aa19cd7-6a86-477a-90ff-765d2bfdd6e5" Apr 12 18:22:43.466265 env[1683]: time="2024-04-12T18:22:43.466192569Z" level=error msg="Failed to destroy network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.469953 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3-shm.mount: Deactivated successfully. Apr 12 18:22:43.472732 env[1683]: time="2024-04-12T18:22:43.472657766Z" level=error msg="encountered an error cleaning up failed sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.473093 env[1683]: time="2024-04-12T18:22:43.473024192Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565468c6d7-76w2z,Uid:9dac466c-3a63-43bb-b8a0-d0ba6fb9964d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.473639 kubelet[2811]: E0412 18:22:43.473581 2811 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.473762 kubelet[2811]: E0412 18:22:43.473707 2811 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-565468c6d7-76w2z" Apr 12 18:22:43.473838 kubelet[2811]: E0412 18:22:43.473763 2811 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-565468c6d7-76w2z" Apr 12 18:22:43.474518 kubelet[2811]: E0412 18:22:43.473944 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-565468c6d7-76w2z_calico-system(9dac466c-3a63-43bb-b8a0-d0ba6fb9964d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-565468c6d7-76w2z_calico-system(9dac466c-3a63-43bb-b8a0-d0ba6fb9964d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-565468c6d7-76w2z" podUID="9dac466c-3a63-43bb-b8a0-d0ba6fb9964d" Apr 12 18:22:43.725163 env[1683]: time="2024-04-12T18:22:43.725113431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:22:43.733923 kubelet[2811]: I0412 18:22:43.733846 2811 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:22:43.735088 env[1683]: time="2024-04-12T18:22:43.735016795Z" level=info msg="StopPodSandbox for \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\"" Apr 12 18:22:43.746587 kubelet[2811]: I0412 18:22:43.745444 2811 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:22:43.747917 env[1683]: time="2024-04-12T18:22:43.747785065Z" level=info msg="StopPodSandbox for \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\"" Apr 12 18:22:43.751296 kubelet[2811]: I0412 18:22:43.750472 2811 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:22:43.751978 env[1683]: time="2024-04-12T18:22:43.751925652Z" level=info msg="StopPodSandbox for \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\"" Apr 12 18:22:43.756903 kubelet[2811]: I0412 18:22:43.755803 2811 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:22:43.757908 env[1683]: time="2024-04-12T18:22:43.757824151Z" level=info msg="StopPodSandbox for \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\"" Apr 12 18:22:43.844840 env[1683]: time="2024-04-12T18:22:43.844699395Z" level=error msg="StopPodSandbox for \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\" failed" error="failed to destroy network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.845272 kubelet[2811]: E0412 18:22:43.845205 2811 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:22:43.845380 kubelet[2811]: E0412 18:22:43.845322 2811 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3"} Apr 12 18:22:43.845461 kubelet[2811]: E0412 18:22:43.845386 2811 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9dac466c-3a63-43bb-b8a0-d0ba6fb9964d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:22:43.845461 kubelet[2811]: E0412 18:22:43.845445 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9dac466c-3a63-43bb-b8a0-d0ba6fb9964d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-565468c6d7-76w2z" podUID="9dac466c-3a63-43bb-b8a0-d0ba6fb9964d" Apr 12 18:22:43.868743 env[1683]: time="2024-04-12T18:22:43.861894121Z" level=error msg="StopPodSandbox for \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\" failed" error="failed to destroy network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.868984 kubelet[2811]: E0412 18:22:43.867982 2811 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:22:43.868984 kubelet[2811]: E0412 18:22:43.868049 2811 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef"} Apr 12 18:22:43.868984 kubelet[2811]: E0412 18:22:43.868110 2811 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1aa19cd7-6a86-477a-90ff-765d2bfdd6e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:22:43.868984 kubelet[2811]: E0412 18:22:43.868164 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1aa19cd7-6a86-477a-90ff-765d2bfdd6e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-whkwp" podUID="1aa19cd7-6a86-477a-90ff-765d2bfdd6e5" Apr 12 18:22:43.880511 env[1683]: time="2024-04-12T18:22:43.880412662Z" level=error msg="StopPodSandbox for \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\" failed" error="failed to destroy network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.881227 kubelet[2811]: E0412 18:22:43.880969 2811 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:22:43.881227 kubelet[2811]: E0412 18:22:43.881044 2811 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4"} Apr 12 18:22:43.881227 kubelet[2811]: E0412 18:22:43.881112 2811 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1225ba6e-932a-4758-bbf2-c64178ccc2b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:22:43.881227 kubelet[2811]: E0412 18:22:43.881168 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1225ba6e-932a-4758-bbf2-c64178ccc2b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-hrv7v" podUID="1225ba6e-932a-4758-bbf2-c64178ccc2b7" Apr 12 18:22:43.897016 env[1683]: time="2024-04-12T18:22:43.896937249Z" level=error msg="StopPodSandbox for \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\" failed" error="failed to destroy network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:22:43.897723 kubelet[2811]: E0412 18:22:43.897486 2811 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:22:43.897723 kubelet[2811]: E0412 18:22:43.897545 2811 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186"} Apr 12 18:22:43.897723 kubelet[2811]: E0412 18:22:43.897605 2811 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ce963011-a06a-4b54-9ee5-38626784b783\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:22:43.897723 kubelet[2811]: E0412 18:22:43.897656 2811 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ce963011-a06a-4b54-9ee5-38626784b783\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wngv7" podUID="ce963011-a06a-4b54-9ee5-38626784b783" Apr 12 18:22:49.711185 kubelet[2811]: I0412 18:22:49.710783 2811 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:22:49.816594 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:22:49.816757 kernel: audit: type=1325 audit(1712946169.807:1177): table=filter:95 family=2 entries=15 op=nft_register_rule pid=3724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:49.807000 audit[3724]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:49.807000 audit[3724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffcd18fe30 a2=0 a3=1 items=0 ppid=2950 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:49.830536 kernel: audit: type=1300 audit(1712946169.807:1177): arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffcd18fe30 a2=0 a3=1 items=0 ppid=2950 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:49.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:49.836714 kernel: audit: type=1327 audit(1712946169.807:1177): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:49.817000 audit[3724]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:49.817000 audit[3724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffcd18fe30 a2=0 a3=1 items=0 ppid=2950 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:49.855410 kernel: audit: type=1325 audit(1712946169.817:1178): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:49.855529 kernel: audit: type=1300 audit(1712946169.817:1178): arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffcd18fe30 a2=0 a3=1 items=0 ppid=2950 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:49.817000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:49.869882 kernel: audit: type=1327 audit(1712946169.817:1178): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:53.258036 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3289256241.mount: Deactivated successfully. Apr 12 18:22:53.367296 env[1683]: time="2024-04-12T18:22:53.367227706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:53.370420 env[1683]: time="2024-04-12T18:22:53.370356190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:53.373332 env[1683]: time="2024-04-12T18:22:53.373280216Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:53.375990 env[1683]: time="2024-04-12T18:22:53.375929185Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:22:53.377313 env[1683]: time="2024-04-12T18:22:53.377247226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:22:53.408186 env[1683]: time="2024-04-12T18:22:53.408092673Z" level=info msg="CreateContainer within sandbox \"68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:22:53.433908 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4039030102.mount: Deactivated successfully. Apr 12 18:22:53.441653 env[1683]: time="2024-04-12T18:22:53.441548222Z" level=info msg="CreateContainer within sandbox \"68565c7a65f2db7a650b6eb58e1dfae03a81308167e5f90558b04a09fdfc86d3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fd705ee0a58bfb7a66149e9a9e2801cb0890b574db9dab5cc9680cb05d6a7988\"" Apr 12 18:22:53.444531 env[1683]: time="2024-04-12T18:22:53.442898807Z" level=info msg="StartContainer for \"fd705ee0a58bfb7a66149e9a9e2801cb0890b574db9dab5cc9680cb05d6a7988\"" Apr 12 18:22:53.476964 systemd[1]: Started cri-containerd-fd705ee0a58bfb7a66149e9a9e2801cb0890b574db9dab5cc9680cb05d6a7988.scope. Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3241 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:53.543714 kernel: audit: type=1400 audit(1712946173.523:1179): avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.543843 kernel: audit: type=1300 audit(1712946173.523:1179): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3241 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:53.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664373035656530613538626662376136363134396539613965323830 Apr 12 18:22:53.554356 kernel: audit: type=1327 audit(1712946173.523:1179): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664373035656530613538626662376136363134396539613965323830 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.562006 kernel: audit: type=1400 audit(1712946173.523:1180): avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.523000 audit: BPF prog-id=148 op=LOAD Apr 12 18:22:53.523000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3241 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:53.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664373035656530613538626662376136363134396539613965323830 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit: BPF prog-id=149 op=LOAD Apr 12 18:22:53.531000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3241 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:53.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664373035656530613538626662376136363134396539613965323830 Apr 12 18:22:53.531000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:22:53.531000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:53.531000 audit: BPF prog-id=150 op=LOAD Apr 12 18:22:53.531000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3241 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:53.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664373035656530613538626662376136363134396539613965323830 Apr 12 18:22:53.591882 env[1683]: time="2024-04-12T18:22:53.591056387Z" level=info msg="StartContainer for \"fd705ee0a58bfb7a66149e9a9e2801cb0890b574db9dab5cc9680cb05d6a7988\" returns successfully" Apr 12 18:22:53.721880 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:22:53.722032 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:22:53.838456 kubelet[2811]: I0412 18:22:53.834826 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-cprlg" podStartSLOduration=1.3687933079999999 podCreationTimestamp="2024-04-12 18:22:30 +0000 UTC" firstStartedPulling="2024-04-12 18:22:30.911775079 +0000 UTC m=+20.709622886" lastFinishedPulling="2024-04-12 18:22:53.377729981 +0000 UTC m=+43.175577800" observedRunningTime="2024-04-12 18:22:53.829199072 +0000 UTC m=+43.627046915" watchObservedRunningTime="2024-04-12 18:22:53.834748222 +0000 UTC m=+43.632596065" Apr 12 18:22:55.551076 env[1683]: time="2024-04-12T18:22:55.549443456Z" level=info msg="StopPodSandbox for \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\"" Apr 12 18:22:55.551076 env[1683]: time="2024-04-12T18:22:55.550124632Z" level=info msg="StopPodSandbox for \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\"" Apr 12 18:22:55.653285 kernel: kauditd_printk_skb: 39 callbacks suppressed Apr 12 18:22:55.653552 kernel: audit: type=1400 audit(1712946175.629:1185): avc: denied { write } for pid=3883 comm="tee" name="fd" dev="proc" ino=20269 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.653631 kernel: audit: type=1400 audit(1712946175.632:1186): avc: denied { write } for pid=3936 comm="tee" name="fd" dev="proc" ino=21014 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.629000 audit[3883]: AVC avc: denied { write } for pid=3883 comm="tee" name="fd" dev="proc" ino=20269 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.632000 audit[3936]: AVC avc: denied { write } for pid=3936 comm="tee" name="fd" dev="proc" ino=21014 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.679004 kernel: audit: type=1300 audit(1712946175.632:1186): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5068987 a2=241 a3=1b6 items=1 ppid=3853 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.632000 audit[3936]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5068987 a2=241 a3=1b6 items=1 ppid=3853 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.632000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:22:55.685090 kernel: audit: type=1307 audit(1712946175.632:1186): cwd="/etc/service/enabled/felix/log" Apr 12 18:22:55.632000 audit: PATH item=0 name="/dev/fd/63" inode=20258 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.693316 kernel: audit: type=1302 audit(1712946175.632:1186): item=0 name="/dev/fd/63" inode=20258 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.632000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:22:55.703376 kernel: audit: type=1327 audit(1712946175.632:1186): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:22:55.648000 audit[3924]: AVC avc: denied { write } for pid=3924 comm="tee" name="fd" dev="proc" ino=21018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.714899 kernel: audit: type=1400 audit(1712946175.648:1187): avc: denied { write } for pid=3924 comm="tee" name="fd" dev="proc" ino=21018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.648000 audit[3924]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb2de987 a2=241 a3=1b6 items=1 ppid=3858 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.733452 kernel: audit: type=1300 audit(1712946175.648:1187): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb2de987 a2=241 a3=1b6 items=1 ppid=3858 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.648000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:22:55.739037 kernel: audit: type=1307 audit(1712946175.648:1187): cwd="/etc/service/enabled/bird6/log" Apr 12 18:22:55.648000 audit: PATH item=0 name="/dev/fd/63" inode=20250 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.747678 kernel: audit: type=1302 audit(1712946175.648:1187): item=0 name="/dev/fd/63" inode=20250 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.648000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:22:55.654000 audit[3945]: AVC avc: denied { write } for pid=3945 comm="tee" name="fd" dev="proc" ino=21024 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.654000 audit[3945]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa946987 a2=241 a3=1b6 items=1 ppid=3850 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.654000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:22:55.654000 audit: PATH item=0 name="/dev/fd/63" inode=21011 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.654000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:22:55.629000 audit[3883]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda169989 a2=241 a3=1b6 items=1 ppid=3854 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.629000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:22:55.629000 audit: PATH item=0 name="/dev/fd/63" inode=20973 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:22:55.782000 audit[3947]: AVC avc: denied { write } for pid=3947 comm="tee" name="fd" dev="proc" ino=20280 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.782000 audit[3947]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6a7c988 a2=241 a3=1b6 items=1 ppid=3860 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.782000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:22:55.782000 audit: PATH item=0 name="/dev/fd/63" inode=20268 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.782000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:22:55.901000 audit[3962]: AVC avc: denied { write } for pid=3962 comm="tee" name="fd" dev="proc" ino=20289 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.904000 audit[3953]: AVC avc: denied { write } for pid=3953 comm="tee" name="fd" dev="proc" ino=20290 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:22:55.904000 audit[3953]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7b23978 a2=241 a3=1b6 items=1 ppid=3864 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.904000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:22:55.904000 audit: PATH item=0 name="/dev/fd/63" inode=20270 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.904000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:22:55.901000 audit[3962]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd9cff977 a2=241 a3=1b6 items=1 ppid=3851 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:55.901000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:22:55.901000 audit: PATH item=0 name="/dev/fd/63" inode=21026 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:55.901000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.792 [INFO][3937] k8s.go 585: Cleaning up netns ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.792 [INFO][3937] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" iface="eth0" netns="/var/run/netns/cni-6518cef5-535d-a6c9-c2e3-74e2af56c17b" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.793 [INFO][3937] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" iface="eth0" netns="/var/run/netns/cni-6518cef5-535d-a6c9-c2e3-74e2af56c17b" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.793 [INFO][3937] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" iface="eth0" netns="/var/run/netns/cni-6518cef5-535d-a6c9-c2e3-74e2af56c17b" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.793 [INFO][3937] k8s.go 592: Releasing IP address(es) ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.793 [INFO][3937] utils.go 188: Calico CNI releasing IP address ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.988 [INFO][3967] ipam_plugin.go 415: Releasing address using handleID ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.989 [INFO][3967] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:55.989 [INFO][3967] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:56.018 [WARNING][3967] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:56.018 [INFO][3967] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:56.022 [INFO][3967] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:22:56.032767 env[1683]: 2024-04-12 18:22:56.027 [INFO][3937] k8s.go 598: Teardown processing complete. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:22:56.037071 env[1683]: time="2024-04-12T18:22:56.036981108Z" level=info msg="TearDown network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\" successfully" Apr 12 18:22:56.037071 env[1683]: time="2024-04-12T18:22:56.037053720Z" level=info msg="StopPodSandbox for \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\" returns successfully" Apr 12 18:22:56.038495 env[1683]: time="2024-04-12T18:22:56.038427723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-whkwp,Uid:1aa19cd7-6a86-477a-90ff-765d2bfdd6e5,Namespace:kube-system,Attempt:1,}" Apr 12 18:22:56.041028 systemd[1]: run-netns-cni\x2d6518cef5\x2d535d\x2da6c9\x2dc2e3\x2d74e2af56c17b.mount: Deactivated successfully. Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:55.819 [INFO][3925] k8s.go 585: Cleaning up netns ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:55.819 [INFO][3925] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" iface="eth0" netns="/var/run/netns/cni-d006cea6-8715-c7c0-c1e1-e640a68403ad" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:55.820 [INFO][3925] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" iface="eth0" netns="/var/run/netns/cni-d006cea6-8715-c7c0-c1e1-e640a68403ad" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:55.821 [INFO][3925] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" iface="eth0" netns="/var/run/netns/cni-d006cea6-8715-c7c0-c1e1-e640a68403ad" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:55.821 [INFO][3925] k8s.go 592: Releasing IP address(es) ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:55.821 [INFO][3925] utils.go 188: Calico CNI releasing IP address ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:55.992 [INFO][3972] ipam_plugin.go 415: Releasing address using handleID ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:55.992 [INFO][3972] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:56.022 [INFO][3972] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:56.053 [WARNING][3972] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:56.054 [INFO][3972] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:56.057 [INFO][3972] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:22:56.066518 env[1683]: 2024-04-12 18:22:56.062 [INFO][3925] k8s.go 598: Teardown processing complete. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:22:56.067773 env[1683]: time="2024-04-12T18:22:56.067719269Z" level=info msg="TearDown network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\" successfully" Apr 12 18:22:56.067957 env[1683]: time="2024-04-12T18:22:56.067921876Z" level=info msg="StopPodSandbox for \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\" returns successfully" Apr 12 18:22:56.073762 systemd[1]: run-netns-cni\x2dd006cea6\x2d8715\x2dc7c0\x2dc1e1\x2de640a68403ad.mount: Deactivated successfully. Apr 12 18:22:56.074900 env[1683]: time="2024-04-12T18:22:56.074816890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hrv7v,Uid:1225ba6e-932a-4758-bbf2-c64178ccc2b7,Namespace:kube-system,Attempt:1,}" Apr 12 18:22:56.908402 systemd-networkd[1498]: calibd51c6fc8db: Link UP Apr 12 18:22:56.913211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:22:56.913366 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibd51c6fc8db: link becomes ready Apr 12 18:22:56.914080 systemd-networkd[1498]: calibd51c6fc8db: Gained carrier Apr 12 18:22:56.926943 (udev-worker)[4074]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.668 [INFO][4030] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0 coredns-5dd5756b68- kube-system 1225ba6e-932a-4758-bbf2-c64178ccc2b7 708 0 2024-04-12 18:22:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-20-40 coredns-5dd5756b68-hrv7v eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibd51c6fc8db [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Namespace="kube-system" Pod="coredns-5dd5756b68-hrv7v" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.668 [INFO][4030] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Namespace="kube-system" Pod="coredns-5dd5756b68-hrv7v" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.774 [INFO][4055] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" HandleID="k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.806 [INFO][4055] ipam_plugin.go 268: Auto assigning IP ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" HandleID="k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263430), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-20-40", "pod":"coredns-5dd5756b68-hrv7v", "timestamp":"2024-04-12 18:22:56.774163358 +0000 UTC"}, Hostname:"ip-172-31-20-40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.806 [INFO][4055] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.806 [INFO][4055] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.806 [INFO][4055] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-40' Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.811 [INFO][4055] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.826 [INFO][4055] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.834 [INFO][4055] ipam.go 489: Trying affinity for 192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.837 [INFO][4055] ipam.go 155: Attempting to load block cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.842 [INFO][4055] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.842 [INFO][4055] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.847 [INFO][4055] ipam.go 1682: Creating new handle: k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223 Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.855 [INFO][4055] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.882 [INFO][4055] ipam.go 1216: Successfully claimed IPs: [192.168.78.193/26] block=192.168.78.192/26 handle="k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.883 [INFO][4055] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.193/26] handle="k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" host="ip-172-31-20-40" Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.883 [INFO][4055] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:22:56.955784 env[1683]: 2024-04-12 18:22:56.883 [INFO][4055] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.193/26] IPv6=[] ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" HandleID="k8s-pod-network.b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.957716 env[1683]: 2024-04-12 18:22:56.886 [INFO][4030] k8s.go 385: Populated endpoint ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Namespace="kube-system" Pod="coredns-5dd5756b68-hrv7v" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1225ba6e-932a-4758-bbf2-c64178ccc2b7", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"", Pod:"coredns-5dd5756b68-hrv7v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibd51c6fc8db", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:22:56.957716 env[1683]: 2024-04-12 18:22:56.886 [INFO][4030] k8s.go 386: Calico CNI using IPs: [192.168.78.193/32] ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Namespace="kube-system" Pod="coredns-5dd5756b68-hrv7v" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.957716 env[1683]: 2024-04-12 18:22:56.886 [INFO][4030] dataplane_linux.go 68: Setting the host side veth name to calibd51c6fc8db ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Namespace="kube-system" Pod="coredns-5dd5756b68-hrv7v" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.957716 env[1683]: 2024-04-12 18:22:56.915 [INFO][4030] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Namespace="kube-system" Pod="coredns-5dd5756b68-hrv7v" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.957716 env[1683]: 2024-04-12 18:22:56.923 [INFO][4030] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Namespace="kube-system" Pod="coredns-5dd5756b68-hrv7v" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1225ba6e-932a-4758-bbf2-c64178ccc2b7", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223", Pod:"coredns-5dd5756b68-hrv7v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibd51c6fc8db", MAC:"ca:f7:17:55:05:9f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:22:56.957716 env[1683]: 2024-04-12 18:22:56.950 [INFO][4030] k8s.go 498: Wrote updated endpoint to datastore ContainerID="b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223" Namespace="kube-system" Pod="coredns-5dd5756b68-hrv7v" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:22:56.989218 (udev-worker)[4073]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:22:56.991282 systemd-networkd[1498]: cali2cc3cd46570: Link UP Apr 12 18:22:56.997398 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2cc3cd46570: link becomes ready Apr 12 18:22:56.997073 systemd-networkd[1498]: cali2cc3cd46570: Gained carrier Apr 12 18:22:57.020508 env[1683]: time="2024-04-12T18:22:57.020389871Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:57.020934 env[1683]: time="2024-04-12T18:22:57.020827712Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:57.021265 env[1683]: time="2024-04-12T18:22:57.021194610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.672 [INFO][4019] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0 coredns-5dd5756b68- kube-system 1aa19cd7-6a86-477a-90ff-765d2bfdd6e5 707 0 2024-04-12 18:22:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-20-40 coredns-5dd5756b68-whkwp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2cc3cd46570 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Namespace="kube-system" Pod="coredns-5dd5756b68-whkwp" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.673 [INFO][4019] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Namespace="kube-system" Pod="coredns-5dd5756b68-whkwp" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.794 [INFO][4056] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" HandleID="k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.819 [INFO][4056] ipam_plugin.go 268: Auto assigning IP ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" HandleID="k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029a790), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-20-40", "pod":"coredns-5dd5756b68-whkwp", "timestamp":"2024-04-12 18:22:56.794413235 +0000 UTC"}, Hostname:"ip-172-31-20-40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.819 [INFO][4056] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.883 [INFO][4056] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.883 [INFO][4056] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-40' Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.890 [INFO][4056] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.898 [INFO][4056] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.922 [INFO][4056] ipam.go 489: Trying affinity for 192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.937 [INFO][4056] ipam.go 155: Attempting to load block cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.943 [INFO][4056] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.943 [INFO][4056] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.950 [INFO][4056] ipam.go 1682: Creating new handle: k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38 Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.965 [INFO][4056] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.979 [INFO][4056] ipam.go 1216: Successfully claimed IPs: [192.168.78.194/26] block=192.168.78.192/26 handle="k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.979 [INFO][4056] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.194/26] handle="k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" host="ip-172-31-20-40" Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.979 [INFO][4056] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:22:57.039506 env[1683]: 2024-04-12 18:22:56.979 [INFO][4056] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.194/26] IPv6=[] ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" HandleID="k8s-pod-network.0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:57.040820 env[1683]: 2024-04-12 18:22:56.985 [INFO][4019] k8s.go 385: Populated endpoint ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Namespace="kube-system" Pod="coredns-5dd5756b68-whkwp" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1aa19cd7-6a86-477a-90ff-765d2bfdd6e5", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"", Pod:"coredns-5dd5756b68-whkwp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2cc3cd46570", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:22:57.040820 env[1683]: 2024-04-12 18:22:56.985 [INFO][4019] k8s.go 386: Calico CNI using IPs: [192.168.78.194/32] ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Namespace="kube-system" Pod="coredns-5dd5756b68-whkwp" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:57.040820 env[1683]: 2024-04-12 18:22:56.985 [INFO][4019] dataplane_linux.go 68: Setting the host side veth name to cali2cc3cd46570 ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Namespace="kube-system" Pod="coredns-5dd5756b68-whkwp" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:57.040820 env[1683]: 2024-04-12 18:22:56.998 [INFO][4019] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Namespace="kube-system" Pod="coredns-5dd5756b68-whkwp" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:57.040820 env[1683]: 2024-04-12 18:22:56.998 [INFO][4019] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Namespace="kube-system" Pod="coredns-5dd5756b68-whkwp" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1aa19cd7-6a86-477a-90ff-765d2bfdd6e5", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38", Pod:"coredns-5dd5756b68-whkwp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2cc3cd46570", MAC:"42:d9:01:b8:e6:11", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:22:57.040820 env[1683]: 2024-04-12 18:22:57.022 [INFO][4019] k8s.go 498: Wrote updated endpoint to datastore ContainerID="0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38" Namespace="kube-system" Pod="coredns-5dd5756b68-whkwp" WorkloadEndpoint="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:22:57.045033 env[1683]: time="2024-04-12T18:22:57.042425061Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223 pid=4098 runtime=io.containerd.runc.v2 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.073000 audit: BPF prog-id=151 op=LOAD Apr 12 18:22:57.073000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdb197458 a2=70 a3=ffffdb1974c8 items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.074000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit: BPF prog-id=152 op=LOAD Apr 12 18:22:57.074000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdb197458 a2=70 a3=4b243c items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.074000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdb197410 a2=70 a3=ffffdb197480 items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit: BPF prog-id=153 op=LOAD Apr 12 18:22:57.074000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffdb1973f8 a2=70 a3=ffffdb197468 items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.074000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdb1974c8 a2=70 a3=0 items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdb1974b8 a2=70 a3=0 items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.074000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.074000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdb197428 a2=70 a3=0 items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdb197500 a2=70 a3=3d3b998f items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.077000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdb197500 a2=70 a3=3d3b998f items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.077000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.077000 audit: BPF prog-id=154 op=LOAD Apr 12 18:22:57.077000 audit[4120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdb197428 a2=70 a3=3d3b99a9 items=0 ppid=3855 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.077000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:22:57.136823 systemd[1]: Started cri-containerd-b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223.scope. Apr 12 18:22:57.146877 env[1683]: time="2024-04-12T18:22:57.145489586Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:57.146877 env[1683]: time="2024-04-12T18:22:57.145631797Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:57.146877 env[1683]: time="2024-04-12T18:22:57.145694028Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:57.146877 env[1683]: time="2024-04-12T18:22:57.145958903Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38 pid=4142 runtime=io.containerd.runc.v2 Apr 12 18:22:57.147000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.147000 audit[4126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc7e60258 a2=70 a3=ffffc7e602c8 items=0 ppid=3855 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.147000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:22:57.147000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.147000 audit[4126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc7e60128 a2=70 a3=ffffc7e60198 items=0 ppid=3855 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.147000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:22:57.170750 systemd[1]: run-containerd-runc-k8s.io-b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223-runc.Bus0n8.mount: Deactivated successfully. Apr 12 18:22:57.196000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:22:57.195752 systemd[1]: Started cri-containerd-0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38.scope. Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.250000 audit: BPF prog-id=155 op=LOAD Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4142 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613039313137376162323063653163376264633837353937373439 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4142 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613039313137376162323063653163376264633837353937373439 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit: BPF prog-id=156 op=LOAD Apr 12 18:22:57.252000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4142 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613039313137376162323063653163376264633837353937373439 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit: BPF prog-id=157 op=LOAD Apr 12 18:22:57.252000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4142 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613039313137376162323063653163376264633837353937373439 Apr 12 18:22:57.252000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:22:57.252000 audit: BPF prog-id=156 op=UNLOAD Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.252000 audit: BPF prog-id=158 op=LOAD Apr 12 18:22:57.252000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4142 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613039313137376162323063653163376264633837353937373439 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.254000 audit: BPF prog-id=159 op=LOAD Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4098 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239616166663361663235393563616130323661623166333439373864 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4098 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239616166663361663235393563616130323661623166333439373864 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit: BPF prog-id=160 op=LOAD Apr 12 18:22:57.255000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4098 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239616166663361663235393563616130323661623166333439373864 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit: BPF prog-id=161 op=LOAD Apr 12 18:22:57.255000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4098 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239616166663361663235393563616130323661623166333439373864 Apr 12 18:22:57.255000 audit: BPF prog-id=161 op=UNLOAD Apr 12 18:22:57.255000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.255000 audit: BPF prog-id=162 op=LOAD Apr 12 18:22:57.255000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4098 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239616166663361663235393563616130323661623166333439373864 Apr 12 18:22:57.324876 env[1683]: time="2024-04-12T18:22:57.324622961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-whkwp,Uid:1aa19cd7-6a86-477a-90ff-765d2bfdd6e5,Namespace:kube-system,Attempt:1,} returns sandbox id \"0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38\"" Apr 12 18:22:57.336816 env[1683]: time="2024-04-12T18:22:57.336731110Z" level=info msg="CreateContainer within sandbox \"0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:22:57.348427 env[1683]: time="2024-04-12T18:22:57.348372269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hrv7v,Uid:1225ba6e-932a-4758-bbf2-c64178ccc2b7,Namespace:kube-system,Attempt:1,} returns sandbox id \"b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223\"" Apr 12 18:22:57.355493 env[1683]: time="2024-04-12T18:22:57.355398602Z" level=info msg="CreateContainer within sandbox \"b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:22:57.375585 env[1683]: time="2024-04-12T18:22:57.375507659Z" level=info msg="CreateContainer within sandbox \"0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"de880afb2c7e053ecfac1a0545c4d86d83041a4c0faa7358f281829f6e3b7055\"" Apr 12 18:22:57.376964 env[1683]: time="2024-04-12T18:22:57.376788316Z" level=info msg="StartContainer for \"de880afb2c7e053ecfac1a0545c4d86d83041a4c0faa7358f281829f6e3b7055\"" Apr 12 18:22:57.396741 env[1683]: time="2024-04-12T18:22:57.396672182Z" level=info msg="CreateContainer within sandbox \"b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a695eca428fd25b144d156a7196b7af5ab594d342ecb5a896a373ecf77227260\"" Apr 12 18:22:57.398069 env[1683]: time="2024-04-12T18:22:57.398014446Z" level=info msg="StartContainer for \"a695eca428fd25b144d156a7196b7af5ab594d342ecb5a896a373ecf77227260\"" Apr 12 18:22:57.435144 systemd[1]: Started cri-containerd-de880afb2c7e053ecfac1a0545c4d86d83041a4c0faa7358f281829f6e3b7055.scope. Apr 12 18:22:57.471693 systemd[1]: Started cri-containerd-a695eca428fd25b144d156a7196b7af5ab594d342ecb5a896a373ecf77227260.scope. Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.491000 audit: BPF prog-id=163 op=LOAD Apr 12 18:22:57.498000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.498000 audit[4212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4142 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383830616662326337653035336563666163316130353435633464 Apr 12 18:22:57.499000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.499000 audit[4212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4142 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383830616662326337653035336563666163316130353435633464 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit: BPF prog-id=164 op=LOAD Apr 12 18:22:57.503000 audit[4212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4142 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383830616662326337653035336563666163316130353435633464 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.503000 audit: BPF prog-id=165 op=LOAD Apr 12 18:22:57.503000 audit[4212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4142 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383830616662326337653035336563666163316130353435633464 Apr 12 18:22:57.503000 audit: BPF prog-id=165 op=UNLOAD Apr 12 18:22:57.503000 audit: BPF prog-id=164 op=UNLOAD Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { perfmon } for pid=4212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit[4212]: AVC avc: denied { bpf } for pid=4212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.504000 audit: BPF prog-id=166 op=LOAD Apr 12 18:22:57.504000 audit[4212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4142 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383830616662326337653035336563666163316130353435633464 Apr 12 18:22:57.550412 env[1683]: time="2024-04-12T18:22:57.549444307Z" level=info msg="StopPodSandbox for \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\"" Apr 12 18:22:57.554530 systemd-networkd[1498]: vxlan.calico: Link UP Apr 12 18:22:57.554549 systemd-networkd[1498]: vxlan.calico: Gained carrier Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.583000 audit: BPF prog-id=167 op=LOAD Apr 12 18:22:57.585000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.585000 audit[4232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4098 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393565636134323866643235623134346431353661373139366237 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4098 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393565636134323866643235623134346431353661373139366237 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.589000 audit: BPF prog-id=168 op=LOAD Apr 12 18:22:57.589000 audit[4232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4098 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393565636134323866643235623134346431353661373139366237 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.590000 audit: BPF prog-id=169 op=LOAD Apr 12 18:22:57.590000 audit[4232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4098 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393565636134323866643235623134346431353661373139366237 Apr 12 18:22:57.591000 audit: BPF prog-id=169 op=UNLOAD Apr 12 18:22:57.591000 audit: BPF prog-id=168 op=UNLOAD Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:57.591000 audit: BPF prog-id=170 op=LOAD Apr 12 18:22:57.591000 audit[4232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4098 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393565636134323866643235623134346431353661373139366237 Apr 12 18:22:57.626540 env[1683]: time="2024-04-12T18:22:57.626455249Z" level=info msg="StartContainer for \"de880afb2c7e053ecfac1a0545c4d86d83041a4c0faa7358f281829f6e3b7055\" returns successfully" Apr 12 18:22:57.637000 audit[4287]: NETFILTER_CFG table=raw:97 family=2 entries=19 op=nft_register_chain pid=4287 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:22:57.637000 audit[4287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffd894e570 a2=0 a3=ffff94190fa8 items=0 ppid=3855 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.637000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:22:57.641000 audit[4274]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:22:57.641000 audit[4274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffcd127d10 a2=0 a3=ffff8943afa8 items=0 ppid=3855 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.641000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:22:57.679085 env[1683]: time="2024-04-12T18:22:57.679020969Z" level=info msg="StartContainer for \"a695eca428fd25b144d156a7196b7af5ab594d342ecb5a896a373ecf77227260\" returns successfully" Apr 12 18:22:57.742000 audit[4281]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=4281 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:22:57.742000 audit[4281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc1c25890 a2=0 a3=ffff8f12bfa8 items=0 ppid=3855 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.742000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:22:57.750000 audit[4301]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4301 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:22:57.750000 audit[4301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd4ee3430 a2=0 a3=ffff96b32fa8 items=0 ppid=3855 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:22:57.889388 kubelet[2811]: I0412 18:22:57.889326 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-whkwp" podStartSLOduration=35.889269908 podCreationTimestamp="2024-04-12 18:22:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:22:57.85939281 +0000 UTC m=+47.657240629" watchObservedRunningTime="2024-04-12 18:22:57.889269908 +0000 UTC m=+47.687117727" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.761 [INFO][4302] k8s.go 585: Cleaning up netns ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.762 [INFO][4302] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" iface="eth0" netns="/var/run/netns/cni-b093e4cc-d242-856a-76db-93e5f82fb5f0" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.762 [INFO][4302] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" iface="eth0" netns="/var/run/netns/cni-b093e4cc-d242-856a-76db-93e5f82fb5f0" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.763 [INFO][4302] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" iface="eth0" netns="/var/run/netns/cni-b093e4cc-d242-856a-76db-93e5f82fb5f0" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.763 [INFO][4302] k8s.go 592: Releasing IP address(es) ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.763 [INFO][4302] utils.go 188: Calico CNI releasing IP address ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.843 [INFO][4320] ipam_plugin.go 415: Releasing address using handleID ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.844 [INFO][4320] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.844 [INFO][4320] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.892 [WARNING][4320] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.892 [INFO][4320] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.897 [INFO][4320] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:22:57.904176 env[1683]: 2024-04-12 18:22:57.900 [INFO][4302] k8s.go 598: Teardown processing complete. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:22:57.905121 env[1683]: time="2024-04-12T18:22:57.904167118Z" level=info msg="TearDown network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\" successfully" Apr 12 18:22:57.905121 env[1683]: time="2024-04-12T18:22:57.904220925Z" level=info msg="StopPodSandbox for \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\" returns successfully" Apr 12 18:22:57.905240 env[1683]: time="2024-04-12T18:22:57.905139376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wngv7,Uid:ce963011-a06a-4b54-9ee5-38626784b783,Namespace:calico-system,Attempt:1,}" Apr 12 18:22:57.950000 audit[4343]: NETFILTER_CFG table=filter:101 family=2 entries=14 op=nft_register_rule pid=4343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:57.950000 audit[4343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffc983b270 a2=0 a3=1 items=0 ppid=2950 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:57.953000 audit[4343]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:57.953000 audit[4343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc983b270 a2=0 a3=1 items=0 ppid=2950 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.953000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:57.958000 audit[4344]: NETFILTER_CFG table=filter:103 family=2 entries=58 op=nft_register_chain pid=4344 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:22:57.958000 audit[4344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=34536 a0=3 a1=ffffd8446d00 a2=0 a3=ffffb80aefa8 items=0 ppid=3855 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.958000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:22:58.050335 systemd[1]: run-netns-cni\x2db093e4cc\x2dd242\x2d856a\x2d76db\x2d93e5f82fb5f0.mount: Deactivated successfully. Apr 12 18:22:58.159402 systemd-networkd[1498]: calie64e1bdfc90: Link UP Apr 12 18:22:58.165032 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie64e1bdfc90: link becomes ready Apr 12 18:22:58.164823 systemd-networkd[1498]: calie64e1bdfc90: Gained carrier Apr 12 18:22:58.184721 kubelet[2811]: I0412 18:22:58.184448 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-hrv7v" podStartSLOduration=36.184387874 podCreationTimestamp="2024-04-12 18:22:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:22:57.88976373 +0000 UTC m=+47.687611573" watchObservedRunningTime="2024-04-12 18:22:58.184387874 +0000 UTC m=+47.982235717" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.002 [INFO][4335] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0 csi-node-driver- calico-system ce963011-a06a-4b54-9ee5-38626784b783 726 0 2024-04-12 18:22:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-20-40 csi-node-driver-wngv7 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calie64e1bdfc90 [] []}} ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Namespace="calico-system" Pod="csi-node-driver-wngv7" WorkloadEndpoint="ip--172--31--20--40-k8s-csi--node--driver--wngv7-" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.002 [INFO][4335] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Namespace="calico-system" Pod="csi-node-driver-wngv7" WorkloadEndpoint="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.071 [INFO][4348] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" HandleID="k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.090 [INFO][4348] ipam_plugin.go 268: Auto assigning IP ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" HandleID="k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ecf70), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-20-40", "pod":"csi-node-driver-wngv7", "timestamp":"2024-04-12 18:22:58.071180837 +0000 UTC"}, Hostname:"ip-172-31-20-40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.090 [INFO][4348] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.090 [INFO][4348] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.091 [INFO][4348] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-40' Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.097 [INFO][4348] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.105 [INFO][4348] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.114 [INFO][4348] ipam.go 489: Trying affinity for 192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.119 [INFO][4348] ipam.go 155: Attempting to load block cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.124 [INFO][4348] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.124 [INFO][4348] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.127 [INFO][4348] ipam.go 1682: Creating new handle: k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034 Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.135 [INFO][4348] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.147 [INFO][4348] ipam.go 1216: Successfully claimed IPs: [192.168.78.195/26] block=192.168.78.192/26 handle="k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.147 [INFO][4348] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.195/26] handle="k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" host="ip-172-31-20-40" Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.147 [INFO][4348] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:22:58.189398 env[1683]: 2024-04-12 18:22:58.148 [INFO][4348] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.195/26] IPv6=[] ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" HandleID="k8s-pod-network.6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:58.191166 env[1683]: 2024-04-12 18:22:58.151 [INFO][4335] k8s.go 385: Populated endpoint ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Namespace="calico-system" Pod="csi-node-driver-wngv7" WorkloadEndpoint="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ce963011-a06a-4b54-9ee5-38626784b783", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"", Pod:"csi-node-driver-wngv7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie64e1bdfc90", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:22:58.191166 env[1683]: 2024-04-12 18:22:58.151 [INFO][4335] k8s.go 386: Calico CNI using IPs: [192.168.78.195/32] ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Namespace="calico-system" Pod="csi-node-driver-wngv7" WorkloadEndpoint="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:58.191166 env[1683]: 2024-04-12 18:22:58.151 [INFO][4335] dataplane_linux.go 68: Setting the host side veth name to calie64e1bdfc90 ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Namespace="calico-system" Pod="csi-node-driver-wngv7" WorkloadEndpoint="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:58.191166 env[1683]: 2024-04-12 18:22:58.165 [INFO][4335] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Namespace="calico-system" Pod="csi-node-driver-wngv7" WorkloadEndpoint="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:58.191166 env[1683]: 2024-04-12 18:22:58.170 [INFO][4335] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Namespace="calico-system" Pod="csi-node-driver-wngv7" WorkloadEndpoint="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ce963011-a06a-4b54-9ee5-38626784b783", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034", Pod:"csi-node-driver-wngv7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie64e1bdfc90", MAC:"fe:74:b6:0b:9e:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:22:58.191166 env[1683]: 2024-04-12 18:22:58.185 [INFO][4335] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034" Namespace="calico-system" Pod="csi-node-driver-wngv7" WorkloadEndpoint="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:22:58.215050 env[1683]: time="2024-04-12T18:22:58.214202840Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:58.215050 env[1683]: time="2024-04-12T18:22:58.214298828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:58.215050 env[1683]: time="2024-04-12T18:22:58.214325864Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:58.215367 env[1683]: time="2024-04-12T18:22:58.215273427Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034 pid=4373 runtime=io.containerd.runc.v2 Apr 12 18:22:58.217592 systemd-networkd[1498]: cali2cc3cd46570: Gained IPv6LL Apr 12 18:22:58.254332 systemd[1]: Started cri-containerd-6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034.scope. Apr 12 18:22:58.277000 audit[4396]: NETFILTER_CFG table=filter:104 family=2 entries=44 op=nft_register_chain pid=4396 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:22:58.281605 systemd[1]: run-containerd-runc-k8s.io-6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034-runc.3qReI8.mount: Deactivated successfully. Apr 12 18:22:58.277000 audit[4396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22780 a0=3 a1=ffffe9d3c820 a2=0 a3=ffff832a0fa8 items=0 ppid=3855 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.277000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.311000 audit: BPF prog-id=171 op=LOAD Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4373 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630393164383864346332663264623566633031663833613937656632 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4373 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630393164383864346332663264623566633031663833613937656632 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit: BPF prog-id=172 op=LOAD Apr 12 18:22:58.312000 audit[4387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4373 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630393164383864346332663264623566633031663833613937656632 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit: BPF prog-id=173 op=LOAD Apr 12 18:22:58.312000 audit[4387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4373 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630393164383864346332663264623566633031663833613937656632 Apr 12 18:22:58.312000 audit: BPF prog-id=173 op=UNLOAD Apr 12 18:22:58.312000 audit: BPF prog-id=172 op=UNLOAD Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:58.312000 audit: BPF prog-id=174 op=LOAD Apr 12 18:22:58.312000 audit[4387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4373 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630393164383864346332663264623566633031663833613937656632 Apr 12 18:22:58.342760 env[1683]: time="2024-04-12T18:22:58.342704568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wngv7,Uid:ce963011-a06a-4b54-9ee5-38626784b783,Namespace:calico-system,Attempt:1,} returns sandbox id \"6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034\"" Apr 12 18:22:58.349251 env[1683]: time="2024-04-12T18:22:58.348821165Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:22:58.473633 systemd-networkd[1498]: calibd51c6fc8db: Gained IPv6LL Apr 12 18:22:58.555986 env[1683]: time="2024-04-12T18:22:58.555928355Z" level=info msg="StopPodSandbox for \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\"" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.665 [INFO][4427] k8s.go 585: Cleaning up netns ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.668 [INFO][4427] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" iface="eth0" netns="/var/run/netns/cni-09aa3d37-891f-d961-a6e0-b0442d723bc8" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.669 [INFO][4427] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" iface="eth0" netns="/var/run/netns/cni-09aa3d37-891f-d961-a6e0-b0442d723bc8" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.669 [INFO][4427] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" iface="eth0" netns="/var/run/netns/cni-09aa3d37-891f-d961-a6e0-b0442d723bc8" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.669 [INFO][4427] k8s.go 592: Releasing IP address(es) ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.670 [INFO][4427] utils.go 188: Calico CNI releasing IP address ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.728 [INFO][4434] ipam_plugin.go 415: Releasing address using handleID ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.728 [INFO][4434] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.729 [INFO][4434] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.742 [WARNING][4434] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.742 [INFO][4434] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.746 [INFO][4434] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:22:58.750687 env[1683]: 2024-04-12 18:22:58.748 [INFO][4427] k8s.go 598: Teardown processing complete. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:22:58.753151 env[1683]: time="2024-04-12T18:22:58.753055867Z" level=info msg="TearDown network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\" successfully" Apr 12 18:22:58.753392 env[1683]: time="2024-04-12T18:22:58.753340793Z" level=info msg="StopPodSandbox for \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\" returns successfully" Apr 12 18:22:58.758085 systemd[1]: run-netns-cni\x2d09aa3d37\x2d891f\x2dd961\x2da6e0\x2db0442d723bc8.mount: Deactivated successfully. Apr 12 18:22:58.760446 env[1683]: time="2024-04-12T18:22:58.760379082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565468c6d7-76w2z,Uid:9dac466c-3a63-43bb-b8a0-d0ba6fb9964d,Namespace:calico-system,Attempt:1,}" Apr 12 18:22:58.935000 audit[4459]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:58.935000 audit[4459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff17d8dc0 a2=0 a3=1 items=0 ppid=2950 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:58.940000 audit[4459]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:58.940000 audit[4459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffff17d8dc0 a2=0 a3=1 items=0 ppid=2950 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:58.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:59.028522 systemd-networkd[1498]: cali75208caf67b: Link UP Apr 12 18:22:59.043759 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:22:59.043980 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali75208caf67b: link becomes ready Apr 12 18:22:59.044220 systemd-networkd[1498]: cali75208caf67b: Gained carrier Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.849 [INFO][4440] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0 calico-kube-controllers-565468c6d7- calico-system 9dac466c-3a63-43bb-b8a0-d0ba6fb9964d 739 0 2024-04-12 18:22:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:565468c6d7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-20-40 calico-kube-controllers-565468c6d7-76w2z eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali75208caf67b [] []}} ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Namespace="calico-system" Pod="calico-kube-controllers-565468c6d7-76w2z" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.850 [INFO][4440] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Namespace="calico-system" Pod="calico-kube-controllers-565468c6d7-76w2z" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.921 [INFO][4452] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" HandleID="k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.947 [INFO][4452] ipam_plugin.go 268: Auto assigning IP ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" HandleID="k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029a150), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-20-40", "pod":"calico-kube-controllers-565468c6d7-76w2z", "timestamp":"2024-04-12 18:22:58.9211912 +0000 UTC"}, Hostname:"ip-172-31-20-40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.947 [INFO][4452] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.948 [INFO][4452] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.948 [INFO][4452] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-40' Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.953 [INFO][4452] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.967 [INFO][4452] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.975 [INFO][4452] ipam.go 489: Trying affinity for 192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.978 [INFO][4452] ipam.go 155: Attempting to load block cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.984 [INFO][4452] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.984 [INFO][4452] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.988 [INFO][4452] ipam.go 1682: Creating new handle: k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714 Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:58.995 [INFO][4452] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:59.009 [INFO][4452] ipam.go 1216: Successfully claimed IPs: [192.168.78.196/26] block=192.168.78.192/26 handle="k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:59.010 [INFO][4452] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.196/26] handle="k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" host="ip-172-31-20-40" Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:59.010 [INFO][4452] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:22:59.071165 env[1683]: 2024-04-12 18:22:59.010 [INFO][4452] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.196/26] IPv6=[] ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" HandleID="k8s-pod-network.e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:59.072549 env[1683]: 2024-04-12 18:22:59.013 [INFO][4440] k8s.go 385: Populated endpoint ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Namespace="calico-system" Pod="calico-kube-controllers-565468c6d7-76w2z" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0", GenerateName:"calico-kube-controllers-565468c6d7-", Namespace:"calico-system", SelfLink:"", UID:"9dac466c-3a63-43bb-b8a0-d0ba6fb9964d", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565468c6d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"", Pod:"calico-kube-controllers-565468c6d7-76w2z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.78.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali75208caf67b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:22:59.072549 env[1683]: 2024-04-12 18:22:59.013 [INFO][4440] k8s.go 386: Calico CNI using IPs: [192.168.78.196/32] ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Namespace="calico-system" Pod="calico-kube-controllers-565468c6d7-76w2z" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:59.072549 env[1683]: 2024-04-12 18:22:59.014 [INFO][4440] dataplane_linux.go 68: Setting the host side veth name to cali75208caf67b ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Namespace="calico-system" Pod="calico-kube-controllers-565468c6d7-76w2z" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:59.072549 env[1683]: 2024-04-12 18:22:59.031 [INFO][4440] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Namespace="calico-system" Pod="calico-kube-controllers-565468c6d7-76w2z" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:59.072549 env[1683]: 2024-04-12 18:22:59.044 [INFO][4440] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Namespace="calico-system" Pod="calico-kube-controllers-565468c6d7-76w2z" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0", GenerateName:"calico-kube-controllers-565468c6d7-", Namespace:"calico-system", SelfLink:"", UID:"9dac466c-3a63-43bb-b8a0-d0ba6fb9964d", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565468c6d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714", Pod:"calico-kube-controllers-565468c6d7-76w2z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.78.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali75208caf67b", MAC:"46:c2:d3:d2:e5:5e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:22:59.072549 env[1683]: 2024-04-12 18:22:59.068 [INFO][4440] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714" Namespace="calico-system" Pod="calico-kube-controllers-565468c6d7-76w2z" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:22:59.114957 env[1683]: time="2024-04-12T18:22:59.114748895Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:22:59.114957 env[1683]: time="2024-04-12T18:22:59.114829427Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:22:59.114957 env[1683]: time="2024-04-12T18:22:59.114899183Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:22:59.115651 env[1683]: time="2024-04-12T18:22:59.115561148Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714 pid=4480 runtime=io.containerd.runc.v2 Apr 12 18:22:59.160556 systemd[1]: Started cri-containerd-e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714.scope. Apr 12 18:22:59.178591 systemd-networkd[1498]: vxlan.calico: Gained IPv6LL Apr 12 18:22:59.184034 systemd[1]: run-containerd-runc-k8s.io-e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714-runc.rYJBDh.mount: Deactivated successfully. Apr 12 18:22:59.200000 audit[4503]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:22:59.200000 audit[4503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21016 a0=3 a1=ffffcffae2f0 a2=0 a3=ffffaba79fa8 items=0 ppid=3855 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit: BPF prog-id=175 op=LOAD Apr 12 18:22:59.220000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539326230396639323366306237323561326332653735386362323166 Apr 12 18:22:59.220000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539326230396639323366306237323561326332653735386362323166 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.221000 audit: BPF prog-id=176 op=LOAD Apr 12 18:22:59.221000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539326230396639323366306237323561326332653735386362323166 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.223000 audit: BPF prog-id=177 op=LOAD Apr 12 18:22:59.223000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539326230396639323366306237323561326332653735386362323166 Apr 12 18:22:59.224000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:22:59.225000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.225000 audit: BPF prog-id=178 op=LOAD Apr 12 18:22:59.225000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539326230396639323366306237323561326332653735386362323166 Apr 12 18:22:59.271792 env[1683]: time="2024-04-12T18:22:59.271732776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565468c6d7-76w2z,Uid:9dac466c-3a63-43bb-b8a0-d0ba6fb9964d,Namespace:calico-system,Attempt:1,} returns sandbox id \"e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714\"" Apr 12 18:22:59.369172 systemd-networkd[1498]: calie64e1bdfc90: Gained IPv6LL Apr 12 18:22:59.969000 audit[4520]: NETFILTER_CFG table=filter:108 family=2 entries=11 op=nft_register_rule pid=4520 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:59.969000 audit[4520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffda9e6520 a2=0 a3=1 items=0 ppid=2950 pid=4520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:59.972000 audit[4520]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=4520 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:59.972000 audit[4520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffda9e6520 a2=0 a3=1 items=0 ppid=2950 pid=4520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.972000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:22:59.995000 audit[4523]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=4523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:22:59.995000 audit[4523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff1d8ba00 a2=0 a3=1 items=0 ppid=2950 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:59.995000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:00.011000 audit[4523]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:00.011000 audit[4523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffff1d8ba00 a2=0 a3=1 items=0 ppid=2950 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:00.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:00.084999 env[1683]: time="2024-04-12T18:23:00.084923064Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:00.087999 env[1683]: time="2024-04-12T18:23:00.087932412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:00.091483 env[1683]: time="2024-04-12T18:23:00.091436122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:00.095169 env[1683]: time="2024-04-12T18:23:00.095120371Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:00.096429 env[1683]: time="2024-04-12T18:23:00.096375578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:23:00.099492 env[1683]: time="2024-04-12T18:23:00.099411110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:23:00.102673 env[1683]: time="2024-04-12T18:23:00.102591457Z" level=info msg="CreateContainer within sandbox \"6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:23:00.131959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3791683465.mount: Deactivated successfully. Apr 12 18:23:00.140064 env[1683]: time="2024-04-12T18:23:00.140002591Z" level=info msg="CreateContainer within sandbox \"6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5502e23ca87a1bafea4b34c9a8cfa75e5cc65ae7fa4feb950e0061d6941df179\"" Apr 12 18:23:00.141400 env[1683]: time="2024-04-12T18:23:00.141347138Z" level=info msg="StartContainer for \"5502e23ca87a1bafea4b34c9a8cfa75e5cc65ae7fa4feb950e0061d6941df179\"" Apr 12 18:23:00.192674 systemd[1]: run-containerd-runc-k8s.io-5502e23ca87a1bafea4b34c9a8cfa75e5cc65ae7fa4feb950e0061d6941df179-runc.ce3VPd.mount: Deactivated successfully. Apr 12 18:23:00.200146 systemd[1]: Started cri-containerd-5502e23ca87a1bafea4b34c9a8cfa75e5cc65ae7fa4feb950e0061d6941df179.scope. Apr 12 18:23:00.202898 systemd-networkd[1498]: cali75208caf67b: Gained IPv6LL Apr 12 18:23:00.242000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.242000 audit[4533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4373 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:00.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535303265323363613837613162616665613462333463396138636661 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.244000 audit: BPF prog-id=179 op=LOAD Apr 12 18:23:00.244000 audit[4533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4373 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:00.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535303265323363613837613162616665613462333463396138636661 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.245000 audit: BPF prog-id=180 op=LOAD Apr 12 18:23:00.245000 audit[4533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4373 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:00.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535303265323363613837613162616665613462333463396138636661 Apr 12 18:23:00.247000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:23:00.247000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.247000 audit: BPF prog-id=181 op=LOAD Apr 12 18:23:00.247000 audit[4533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4373 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:00.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535303265323363613837613162616665613462333463396138636661 Apr 12 18:23:00.277257 env[1683]: time="2024-04-12T18:23:00.277179609Z" level=info msg="StartContainer for \"5502e23ca87a1bafea4b34c9a8cfa75e5cc65ae7fa4feb950e0061d6941df179\" returns successfully" Apr 12 18:23:03.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.20.40:22-139.178.89.65:56374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:03.561529 systemd[1]: Started sshd@7-172.31.20.40:22-139.178.89.65:56374.service. Apr 12 18:23:03.564561 kernel: kauditd_printk_skb: 532 callbacks suppressed Apr 12 18:23:03.564617 kernel: audit: type=1130 audit(1712946183.561:1337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.20.40:22-139.178.89.65:56374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:03.794000 audit[4569]: USER_ACCT pid=4569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.796250 sshd[4569]: Accepted publickey for core from 139.178.89.65 port 56374 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:03.808329 sshd[4569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:03.816374 kernel: audit: type=1101 audit(1712946183.794:1338): pid=4569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.816547 kernel: audit: type=1103 audit(1712946183.804:1339): pid=4569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.804000 audit[4569]: CRED_ACQ pid=4569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.841335 kernel: audit: type=1006 audit(1712946183.804:1340): pid=4569 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Apr 12 18:23:03.804000 audit[4569]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4e7d6a0 a2=3 a3=1 items=0 ppid=1 pid=4569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:03.842777 systemd-logind[1677]: New session 8 of user core. Apr 12 18:23:03.843067 systemd[1]: Started session-8.scope. Apr 12 18:23:03.853912 kernel: audit: type=1300 audit(1712946183.804:1340): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4e7d6a0 a2=3 a3=1 items=0 ppid=1 pid=4569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:03.804000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:03.872198 kernel: audit: type=1327 audit(1712946183.804:1340): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:03.872289 kernel: audit: type=1105 audit(1712946183.856:1341): pid=4569 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.856000 audit[4569]: USER_START pid=4569 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.859000 audit[4574]: CRED_ACQ pid=4574 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.896236 kernel: audit: type=1103 audit(1712946183.859:1342): pid=4574 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:04.113073 env[1683]: time="2024-04-12T18:23:04.112924629Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.118387 env[1683]: time="2024-04-12T18:23:04.118331337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.122955 env[1683]: time="2024-04-12T18:23:04.122896151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.129991 env[1683]: time="2024-04-12T18:23:04.129832760Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.132671 env[1683]: time="2024-04-12T18:23:04.131560649Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 18:23:04.138432 env[1683]: time="2024-04-12T18:23:04.138363662Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:23:04.175885 env[1683]: time="2024-04-12T18:23:04.174499591Z" level=info msg="CreateContainer within sandbox \"e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:23:04.213799 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1367404971.mount: Deactivated successfully. Apr 12 18:23:04.216091 env[1683]: time="2024-04-12T18:23:04.216027012Z" level=info msg="CreateContainer within sandbox \"e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1106ee4e1878ef4abea2a27c7c52f6cdc4268c8dda7b7427a297ab4dc979cb93\"" Apr 12 18:23:04.217567 env[1683]: time="2024-04-12T18:23:04.217302286Z" level=info msg="StartContainer for \"1106ee4e1878ef4abea2a27c7c52f6cdc4268c8dda7b7427a297ab4dc979cb93\"" Apr 12 18:23:04.272000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:04.272553 systemd[1]: Started cri-containerd-1106ee4e1878ef4abea2a27c7c52f6cdc4268c8dda7b7427a297ab4dc979cb93.scope. Apr 12 18:23:04.291632 sshd[4569]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:04.272000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400278b820 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:23:04.306059 kernel: audit: type=1400 audit(1712946184.272:1343): avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:04.306219 kernel: audit: type=1300 audit(1712946184.272:1343): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400278b820 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:23:04.311438 systemd[1]: sshd@7-172.31.20.40:22-139.178.89.65:56374.service: Deactivated successfully. Apr 12 18:23:04.312902 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:23:04.315664 systemd-logind[1677]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:23:04.318061 systemd-logind[1677]: Removed session 8. Apr 12 18:23:04.272000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:04.282000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:04.282000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400252bfb0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:23:04.282000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:04.307000 audit[4569]: USER_END pid=4569 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:04.307000 audit[4569]: CRED_DISP pid=4569 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:04.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.20.40:22-139.178.89.65:56374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.345000 audit: BPF prog-id=182 op=LOAD Apr 12 18:23:04.347000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.347000 audit[4592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4480 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303665653465313837386566346162656132613237633763353266 Apr 12 18:23:04.347000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.347000 audit[4592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4480 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303665653465313837386566346162656132613237633763353266 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit: BPF prog-id=183 op=LOAD Apr 12 18:23:04.348000 audit[4592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4480 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303665653465313837386566346162656132613237633763353266 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit: BPF prog-id=184 op=LOAD Apr 12 18:23:04.348000 audit[4592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4480 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303665653465313837386566346162656132613237633763353266 Apr 12 18:23:04.348000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:23:04.348000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.348000 audit: BPF prog-id=185 op=LOAD Apr 12 18:23:04.348000 audit[4592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4480 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303665653465313837386566346162656132613237633763353266 Apr 12 18:23:04.420375 env[1683]: time="2024-04-12T18:23:04.420219431Z" level=info msg="StartContainer for \"1106ee4e1878ef4abea2a27c7c52f6cdc4268c8dda7b7427a297ab4dc979cb93\" returns successfully" Apr 12 18:23:04.902548 kubelet[2811]: I0412 18:23:04.902001 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-565468c6d7-76w2z" podStartSLOduration=30.040133838 podCreationTimestamp="2024-04-12 18:22:30 +0000 UTC" firstStartedPulling="2024-04-12 18:22:59.274781039 +0000 UTC m=+49.072628846" lastFinishedPulling="2024-04-12 18:23:04.136590306 +0000 UTC m=+53.934438173" observedRunningTime="2024-04-12 18:23:04.90166827 +0000 UTC m=+54.699516113" watchObservedRunningTime="2024-04-12 18:23:04.901943165 +0000 UTC m=+54.699791008" Apr 12 18:23:05.172039 systemd[1]: run-containerd-runc-k8s.io-fd705ee0a58bfb7a66149e9a9e2801cb0890b574db9dab5cc9680cb05d6a7988-runc.xMg6ig.mount: Deactivated successfully. Apr 12 18:23:05.832000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:05.832000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=401183d0e0 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:23:05.832000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:05.838000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:05.839000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:05.839000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4011b7adb0 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:23:05.839000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:05.838000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=4011f2e320 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:23:05.838000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:05.844000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:05.844000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=401183d770 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:23:05.844000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:05.871000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:05.871000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4012198630 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:23:05.871000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:05.871000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:05.871000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4011f2ef20 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:23:05.871000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:23:06.404437 env[1683]: time="2024-04-12T18:23:06.404369423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:06.410589 env[1683]: time="2024-04-12T18:23:06.410533959Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:06.414946 env[1683]: time="2024-04-12T18:23:06.414890829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:06.419368 env[1683]: time="2024-04-12T18:23:06.419313363Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:06.421818 env[1683]: time="2024-04-12T18:23:06.420843925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:23:06.425463 env[1683]: time="2024-04-12T18:23:06.425406595Z" level=info msg="CreateContainer within sandbox \"6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:23:06.453084 env[1683]: time="2024-04-12T18:23:06.453015185Z" level=info msg="CreateContainer within sandbox \"6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2adf0e7a29c89b3d7700de8fb4e547b39b7cc1233280e7fb0b57c7ce99358eca\"" Apr 12 18:23:06.454585 env[1683]: time="2024-04-12T18:23:06.454526259Z" level=info msg="StartContainer for \"2adf0e7a29c89b3d7700de8fb4e547b39b7cc1233280e7fb0b57c7ce99358eca\"" Apr 12 18:23:06.501400 systemd[1]: Started cri-containerd-2adf0e7a29c89b3d7700de8fb4e547b39b7cc1233280e7fb0b57c7ce99358eca.scope. Apr 12 18:23:06.528263 systemd[1]: run-containerd-runc-k8s.io-2adf0e7a29c89b3d7700de8fb4e547b39b7cc1233280e7fb0b57c7ce99358eca-runc.VaVW6u.mount: Deactivated successfully. Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4373 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:06.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646630653761323963383962336437373030646538666234653534 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.623000 audit: BPF prog-id=186 op=LOAD Apr 12 18:23:06.623000 audit[4666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4373 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:06.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646630653761323963383962336437373030646538666234653534 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.625000 audit: BPF prog-id=187 op=LOAD Apr 12 18:23:06.625000 audit[4666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4373 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:06.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646630653761323963383962336437373030646538666234653534 Apr 12 18:23:06.627000 audit: BPF prog-id=187 op=UNLOAD Apr 12 18:23:06.627000 audit: BPF prog-id=186 op=UNLOAD Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.627000 audit: BPF prog-id=188 op=LOAD Apr 12 18:23:06.627000 audit[4666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4373 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:06.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646630653761323963383962336437373030646538666234653534 Apr 12 18:23:06.662364 env[1683]: time="2024-04-12T18:23:06.662210735Z" level=info msg="StartContainer for \"2adf0e7a29c89b3d7700de8fb4e547b39b7cc1233280e7fb0b57c7ce99358eca\" returns successfully" Apr 12 18:23:06.745841 kubelet[2811]: I0412 18:23:06.745795 2811 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:23:06.746538 kubelet[2811]: I0412 18:23:06.746502 2811 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:23:09.322358 systemd[1]: Started sshd@8-172.31.20.40:22-139.178.89.65:33596.service. Apr 12 18:23:09.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.20.40:22-139.178.89.65:33596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:09.326916 kernel: kauditd_printk_skb: 125 callbacks suppressed Apr 12 18:23:09.327081 kernel: audit: type=1130 audit(1712946189.322:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.20.40:22-139.178.89.65:33596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:09.514000 audit[4710]: USER_ACCT pid=4710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.516146 sshd[4710]: Accepted publickey for core from 139.178.89.65 port 33596 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:09.526929 kernel: audit: type=1101 audit(1712946189.514:1379): pid=4710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.526000 audit[4710]: CRED_ACQ pid=4710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.528894 sshd[4710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:09.543507 kernel: audit: type=1103 audit(1712946189.526:1380): pid=4710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.543655 kernel: audit: type=1006 audit(1712946189.526:1381): pid=4710 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 18:23:09.526000 audit[4710]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffef4c1b0 a2=3 a3=1 items=0 ppid=1 pid=4710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.553826 kernel: audit: type=1300 audit(1712946189.526:1381): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffef4c1b0 a2=3 a3=1 items=0 ppid=1 pid=4710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.526000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:09.558470 kernel: audit: type=1327 audit(1712946189.526:1381): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:09.564353 systemd-logind[1677]: New session 9 of user core. Apr 12 18:23:09.564985 systemd[1]: Started session-9.scope. Apr 12 18:23:09.573000 audit[4710]: USER_START pid=4710 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.587000 audit[4712]: CRED_ACQ pid=4712 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.597584 kernel: audit: type=1105 audit(1712946189.573:1382): pid=4710 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.597667 kernel: audit: type=1103 audit(1712946189.587:1383): pid=4712 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.825183 sshd[4710]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:09.826000 audit[4710]: USER_END pid=4710 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.826000 audit[4710]: CRED_DISP pid=4710 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.839021 systemd[1]: sshd@8-172.31.20.40:22-139.178.89.65:33596.service: Deactivated successfully. Apr 12 18:23:09.840367 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:23:09.847523 kernel: audit: type=1106 audit(1712946189.826:1384): pid=4710 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.847674 kernel: audit: type=1104 audit(1712946189.826:1385): pid=4710 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:09.848886 systemd-logind[1677]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:23:09.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.20.40:22-139.178.89.65:33596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:09.850675 systemd-logind[1677]: Removed session 9. Apr 12 18:23:09.920000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:09.920000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ac3de0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:23:09.920000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:09.922000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:09.922000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c1ba0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:23:09.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:09.927000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:09.927000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:23:09.927000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40027c1bc0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:23:09.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:09.927000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002900100 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:23:09.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:23:10.451464 env[1683]: time="2024-04-12T18:23:10.451401927Z" level=info msg="StopPodSandbox for \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\"" Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.531 [WARNING][4735] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1225ba6e-932a-4758-bbf2-c64178ccc2b7", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223", Pod:"coredns-5dd5756b68-hrv7v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibd51c6fc8db", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.532 [INFO][4735] k8s.go 585: Cleaning up netns ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.532 [INFO][4735] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" iface="eth0" netns="" Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.532 [INFO][4735] k8s.go 592: Releasing IP address(es) ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.532 [INFO][4735] utils.go 188: Calico CNI releasing IP address ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.589 [INFO][4742] ipam_plugin.go 415: Releasing address using handleID ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.590 [INFO][4742] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.590 [INFO][4742] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.603 [WARNING][4742] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.603 [INFO][4742] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.606 [INFO][4742] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:10.612218 env[1683]: 2024-04-12 18:23:10.609 [INFO][4735] k8s.go 598: Teardown processing complete. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:23:10.613687 env[1683]: time="2024-04-12T18:23:10.612266993Z" level=info msg="TearDown network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\" successfully" Apr 12 18:23:10.613687 env[1683]: time="2024-04-12T18:23:10.612313697Z" level=info msg="StopPodSandbox for \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\" returns successfully" Apr 12 18:23:10.613687 env[1683]: time="2024-04-12T18:23:10.613196981Z" level=info msg="RemovePodSandbox for \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\"" Apr 12 18:23:10.613687 env[1683]: time="2024-04-12T18:23:10.613249505Z" level=info msg="Forcibly stopping sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\"" Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.691 [WARNING][4762] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1225ba6e-932a-4758-bbf2-c64178ccc2b7", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"b9aaff3af2595caa026ab1f34978db23f1399a737e35a5a171fdea8462b91223", Pod:"coredns-5dd5756b68-hrv7v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibd51c6fc8db", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.691 [INFO][4762] k8s.go 585: Cleaning up netns ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.691 [INFO][4762] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" iface="eth0" netns="" Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.691 [INFO][4762] k8s.go 592: Releasing IP address(es) ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.691 [INFO][4762] utils.go 188: Calico CNI releasing IP address ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.750 [INFO][4769] ipam_plugin.go 415: Releasing address using handleID ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.750 [INFO][4769] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.750 [INFO][4769] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.769 [WARNING][4769] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.769 [INFO][4769] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" HandleID="k8s-pod-network.1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--hrv7v-eth0" Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.772 [INFO][4769] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:10.778628 env[1683]: 2024-04-12 18:23:10.774 [INFO][4762] k8s.go 598: Teardown processing complete. ContainerID="1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4" Apr 12 18:23:10.778628 env[1683]: time="2024-04-12T18:23:10.777444367Z" level=info msg="TearDown network for sandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\" successfully" Apr 12 18:23:10.783718 env[1683]: time="2024-04-12T18:23:10.783620012Z" level=info msg="RemovePodSandbox \"1cd1d048370cb9e50513719605788e80410692fbe6cf5df6758301e6480b71e4\" returns successfully" Apr 12 18:23:10.784532 env[1683]: time="2024-04-12T18:23:10.784442373Z" level=info msg="StopPodSandbox for \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\"" Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.847 [WARNING][4789] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0", GenerateName:"calico-kube-controllers-565468c6d7-", Namespace:"calico-system", SelfLink:"", UID:"9dac466c-3a63-43bb-b8a0-d0ba6fb9964d", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565468c6d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714", Pod:"calico-kube-controllers-565468c6d7-76w2z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.78.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali75208caf67b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.847 [INFO][4789] k8s.go 585: Cleaning up netns ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.848 [INFO][4789] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" iface="eth0" netns="" Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.848 [INFO][4789] k8s.go 592: Releasing IP address(es) ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.848 [INFO][4789] utils.go 188: Calico CNI releasing IP address ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.898 [INFO][4795] ipam_plugin.go 415: Releasing address using handleID ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.898 [INFO][4795] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.898 [INFO][4795] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.911 [WARNING][4795] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.912 [INFO][4795] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.914 [INFO][4795] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:10.919422 env[1683]: 2024-04-12 18:23:10.916 [INFO][4789] k8s.go 598: Teardown processing complete. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:23:10.920545 env[1683]: time="2024-04-12T18:23:10.920494303Z" level=info msg="TearDown network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\" successfully" Apr 12 18:23:10.920677 env[1683]: time="2024-04-12T18:23:10.920644219Z" level=info msg="StopPodSandbox for \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\" returns successfully" Apr 12 18:23:10.921633 env[1683]: time="2024-04-12T18:23:10.921570535Z" level=info msg="RemovePodSandbox for \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\"" Apr 12 18:23:10.921800 env[1683]: time="2024-04-12T18:23:10.921631555Z" level=info msg="Forcibly stopping sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\"" Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:10.988 [WARNING][4813] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0", GenerateName:"calico-kube-controllers-565468c6d7-", Namespace:"calico-system", SelfLink:"", UID:"9dac466c-3a63-43bb-b8a0-d0ba6fb9964d", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565468c6d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"e92b09f923f0b725a2c2e758cb21f13645daf3e079c102852ec63f017e0bb714", Pod:"calico-kube-controllers-565468c6d7-76w2z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.78.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali75208caf67b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:10.988 [INFO][4813] k8s.go 585: Cleaning up netns ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:10.989 [INFO][4813] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" iface="eth0" netns="" Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:10.989 [INFO][4813] k8s.go 592: Releasing IP address(es) ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:10.989 [INFO][4813] utils.go 188: Calico CNI releasing IP address ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:11.024 [INFO][4819] ipam_plugin.go 415: Releasing address using handleID ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:11.024 [INFO][4819] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:11.025 [INFO][4819] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:11.037 [WARNING][4819] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:11.037 [INFO][4819] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" HandleID="k8s-pod-network.b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Workload="ip--172--31--20--40-k8s-calico--kube--controllers--565468c6d7--76w2z-eth0" Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:11.039 [INFO][4819] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:11.045901 env[1683]: 2024-04-12 18:23:11.041 [INFO][4813] k8s.go 598: Teardown processing complete. ContainerID="b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3" Apr 12 18:23:11.046934 env[1683]: time="2024-04-12T18:23:11.046842339Z" level=info msg="TearDown network for sandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\" successfully" Apr 12 18:23:11.052412 env[1683]: time="2024-04-12T18:23:11.052345938Z" level=info msg="RemovePodSandbox \"b997fa0ae4c4d38c9c062f4cb2876e1abe9b23ac55a9eb2266fb00dd4a0683d3\" returns successfully" Apr 12 18:23:11.053473 env[1683]: time="2024-04-12T18:23:11.053429443Z" level=info msg="StopPodSandbox for \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\"" Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.134 [WARNING][4837] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1aa19cd7-6a86-477a-90ff-765d2bfdd6e5", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38", Pod:"coredns-5dd5756b68-whkwp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2cc3cd46570", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.135 [INFO][4837] k8s.go 585: Cleaning up netns ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.136 [INFO][4837] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" iface="eth0" netns="" Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.136 [INFO][4837] k8s.go 592: Releasing IP address(es) ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.137 [INFO][4837] utils.go 188: Calico CNI releasing IP address ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.195 [INFO][4843] ipam_plugin.go 415: Releasing address using handleID ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.196 [INFO][4843] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.196 [INFO][4843] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.209 [WARNING][4843] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.209 [INFO][4843] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.212 [INFO][4843] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:11.217447 env[1683]: 2024-04-12 18:23:11.214 [INFO][4837] k8s.go 598: Teardown processing complete. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:23:11.218520 env[1683]: time="2024-04-12T18:23:11.217484238Z" level=info msg="TearDown network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\" successfully" Apr 12 18:23:11.218520 env[1683]: time="2024-04-12T18:23:11.217529646Z" level=info msg="StopPodSandbox for \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\" returns successfully" Apr 12 18:23:11.218520 env[1683]: time="2024-04-12T18:23:11.218217679Z" level=info msg="RemovePodSandbox for \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\"" Apr 12 18:23:11.218520 env[1683]: time="2024-04-12T18:23:11.218334235Z" level=info msg="Forcibly stopping sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\"" Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.294 [WARNING][4862] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1aa19cd7-6a86-477a-90ff-765d2bfdd6e5", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"0da091177ab20ce1c7bdc8759774967c45c2ac5b4f2b9343b781d07382b32f38", Pod:"coredns-5dd5756b68-whkwp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2cc3cd46570", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.295 [INFO][4862] k8s.go 585: Cleaning up netns ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.295 [INFO][4862] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" iface="eth0" netns="" Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.295 [INFO][4862] k8s.go 592: Releasing IP address(es) ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.295 [INFO][4862] utils.go 188: Calico CNI releasing IP address ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.329 [INFO][4868] ipam_plugin.go 415: Releasing address using handleID ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.329 [INFO][4868] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.329 [INFO][4868] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.345 [WARNING][4868] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.345 [INFO][4868] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" HandleID="k8s-pod-network.3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Workload="ip--172--31--20--40-k8s-coredns--5dd5756b68--whkwp-eth0" Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.348 [INFO][4868] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:11.353592 env[1683]: 2024-04-12 18:23:11.350 [INFO][4862] k8s.go 598: Teardown processing complete. ContainerID="3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef" Apr 12 18:23:11.355012 env[1683]: time="2024-04-12T18:23:11.354949937Z" level=info msg="TearDown network for sandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\" successfully" Apr 12 18:23:11.359895 env[1683]: time="2024-04-12T18:23:11.359819779Z" level=info msg="RemovePodSandbox \"3ef21f700ae4921a5903285ba07ae1fedba77f7676c888707e9c422237e194ef\" returns successfully" Apr 12 18:23:11.360948 env[1683]: time="2024-04-12T18:23:11.360898316Z" level=info msg="StopPodSandbox for \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\"" Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.430 [WARNING][4887] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ce963011-a06a-4b54-9ee5-38626784b783", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034", Pod:"csi-node-driver-wngv7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie64e1bdfc90", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.430 [INFO][4887] k8s.go 585: Cleaning up netns ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.430 [INFO][4887] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" iface="eth0" netns="" Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.430 [INFO][4887] k8s.go 592: Releasing IP address(es) ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.430 [INFO][4887] utils.go 188: Calico CNI releasing IP address ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.471 [INFO][4893] ipam_plugin.go 415: Releasing address using handleID ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.471 [INFO][4893] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.471 [INFO][4893] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.485 [WARNING][4893] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.485 [INFO][4893] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.491 [INFO][4893] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:11.496226 env[1683]: 2024-04-12 18:23:11.493 [INFO][4887] k8s.go 598: Teardown processing complete. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:23:11.500796 env[1683]: time="2024-04-12T18:23:11.496285421Z" level=info msg="TearDown network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\" successfully" Apr 12 18:23:11.500796 env[1683]: time="2024-04-12T18:23:11.496339517Z" level=info msg="StopPodSandbox for \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\" returns successfully" Apr 12 18:23:11.500796 env[1683]: time="2024-04-12T18:23:11.497469317Z" level=info msg="RemovePodSandbox for \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\"" Apr 12 18:23:11.500796 env[1683]: time="2024-04-12T18:23:11.497540717Z" level=info msg="Forcibly stopping sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\"" Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.594 [WARNING][4912] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ce963011-a06a-4b54-9ee5-38626784b783", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 22, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"6091d88d4c2f2db5fc01f83a97ef25a9bed7441d455f2034731facc2f5a2f034", Pod:"csi-node-driver-wngv7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie64e1bdfc90", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.595 [INFO][4912] k8s.go 585: Cleaning up netns ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.595 [INFO][4912] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" iface="eth0" netns="" Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.595 [INFO][4912] k8s.go 592: Releasing IP address(es) ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.595 [INFO][4912] utils.go 188: Calico CNI releasing IP address ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.632 [INFO][4918] ipam_plugin.go 415: Releasing address using handleID ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.632 [INFO][4918] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.633 [INFO][4918] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.647 [WARNING][4918] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.647 [INFO][4918] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" HandleID="k8s-pod-network.d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Workload="ip--172--31--20--40-k8s-csi--node--driver--wngv7-eth0" Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.650 [INFO][4918] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:11.654669 env[1683]: 2024-04-12 18:23:11.652 [INFO][4912] k8s.go 598: Teardown processing complete. ContainerID="d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186" Apr 12 18:23:11.656645 env[1683]: time="2024-04-12T18:23:11.654613094Z" level=info msg="TearDown network for sandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\" successfully" Apr 12 18:23:11.661691 env[1683]: time="2024-04-12T18:23:11.661623413Z" level=info msg="RemovePodSandbox \"d94fe8a4291cd3f0a6cb75efdb785b50546c6955780c7cb33096813f642cf186\" returns successfully" Apr 12 18:23:14.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.20.40:22-139.178.89.65:33598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:14.851405 systemd[1]: Started sshd@9-172.31.20.40:22-139.178.89.65:33598.service. Apr 12 18:23:14.853979 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:23:14.854081 kernel: audit: type=1130 audit(1712946194.850:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.20.40:22-139.178.89.65:33598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:15.027000 audit[4946]: USER_ACCT pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.028761 sshd[4946]: Accepted publickey for core from 139.178.89.65 port 33598 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:15.038914 kernel: audit: type=1101 audit(1712946195.027:1392): pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.039000 audit[4946]: CRED_ACQ pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.041595 sshd[4946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:15.056647 kernel: audit: type=1103 audit(1712946195.039:1393): pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.057022 kernel: audit: type=1006 audit(1712946195.039:1394): pid=4946 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:23:15.039000 audit[4946]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb96b440 a2=3 a3=1 items=0 ppid=1 pid=4946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:15.067717 kernel: audit: type=1300 audit(1712946195.039:1394): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb96b440 a2=3 a3=1 items=0 ppid=1 pid=4946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:15.067912 kernel: audit: type=1327 audit(1712946195.039:1394): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:15.039000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:15.077534 systemd-logind[1677]: New session 10 of user core. Apr 12 18:23:15.078750 systemd[1]: Started session-10.scope. Apr 12 18:23:15.091000 audit[4946]: USER_START pid=4946 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.103000 audit[4948]: CRED_ACQ pid=4948 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.113648 kernel: audit: type=1105 audit(1712946195.091:1395): pid=4946 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.113786 kernel: audit: type=1103 audit(1712946195.103:1396): pid=4948 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.335121 sshd[4946]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:15.336000 audit[4946]: USER_END pid=4946 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.349266 systemd[1]: sshd@9-172.31.20.40:22-139.178.89.65:33598.service: Deactivated successfully. Apr 12 18:23:15.336000 audit[4946]: CRED_DISP pid=4946 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.360035 kernel: audit: type=1106 audit(1712946195.336:1397): pid=4946 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.360159 kernel: audit: type=1104 audit(1712946195.336:1398): pid=4946 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.350595 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:23:15.359208 systemd-logind[1677]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:23:15.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.20.40:22-139.178.89.65:33598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:15.366498 systemd-logind[1677]: Removed session 10. Apr 12 18:23:15.371042 systemd[1]: Started sshd@10-172.31.20.40:22-139.178.89.65:33610.service. Apr 12 18:23:15.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.20.40:22-139.178.89.65:33610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:15.550000 audit[4959]: USER_ACCT pid=4959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.551890 sshd[4959]: Accepted publickey for core from 139.178.89.65 port 33610 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:15.553000 audit[4959]: CRED_ACQ pid=4959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.553000 audit[4959]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc84b8560 a2=3 a3=1 items=0 ppid=1 pid=4959 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:15.553000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:15.554905 sshd[4959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:15.563832 systemd[1]: Started session-11.scope. Apr 12 18:23:15.564903 systemd-logind[1677]: New session 11 of user core. Apr 12 18:23:15.574000 audit[4959]: USER_START pid=4959 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:15.577000 audit[4961]: CRED_ACQ pid=4961 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.189908 sshd[4959]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:16.192000 audit[4959]: USER_END pid=4959 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.192000 audit[4959]: CRED_DISP pid=4959 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.195473 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:23:16.196817 systemd-logind[1677]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:23:16.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.20.40:22-139.178.89.65:33610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:16.197145 systemd[1]: sshd@10-172.31.20.40:22-139.178.89.65:33610.service: Deactivated successfully. Apr 12 18:23:16.201241 systemd-logind[1677]: Removed session 11. Apr 12 18:23:16.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.20.40:22-139.178.89.65:33618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:16.220685 systemd[1]: Started sshd@11-172.31.20.40:22-139.178.89.65:33618.service. Apr 12 18:23:16.408000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.409872 sshd[4970]: Accepted publickey for core from 139.178.89.65 port 33618 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:16.410000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.411000 audit[4970]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce5a1db0 a2=3 a3=1 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:16.411000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:16.413048 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:16.422702 systemd[1]: Started session-12.scope. Apr 12 18:23:16.424075 systemd-logind[1677]: New session 12 of user core. Apr 12 18:23:16.433000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.436000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.690078 sshd[4970]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:16.691000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.691000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:16.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.20.40:22-139.178.89.65:33618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:16.696540 systemd[1]: sshd@11-172.31.20.40:22-139.178.89.65:33618.service: Deactivated successfully. Apr 12 18:23:16.696827 systemd-logind[1677]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:23:16.697952 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:23:16.699774 systemd-logind[1677]: Removed session 12. Apr 12 18:23:21.722106 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:23:21.722298 kernel: audit: type=1130 audit(1712946201.719:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.20.40:22-139.178.89.65:59950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:21.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.20.40:22-139.178.89.65:59950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:21.719769 systemd[1]: Started sshd@12-172.31.20.40:22-139.178.89.65:59950.service. Apr 12 18:23:21.899000 audit[4996]: USER_ACCT pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:21.903092 sshd[4996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:21.904239 sshd[4996]: Accepted publickey for core from 139.178.89.65 port 59950 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:21.901000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:21.920329 kernel: audit: type=1101 audit(1712946201.899:1419): pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:21.920457 kernel: audit: type=1103 audit(1712946201.901:1420): pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:21.927895 kernel: audit: type=1006 audit(1712946201.901:1421): pid=4996 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:23:21.928040 kernel: audit: type=1300 audit(1712946201.901:1421): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4cc3380 a2=3 a3=1 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:21.901000 audit[4996]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4cc3380 a2=3 a3=1 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:21.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:21.938005 systemd-logind[1677]: New session 13 of user core. Apr 12 18:23:21.942205 kernel: audit: type=1327 audit(1712946201.901:1421): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:21.942119 systemd[1]: Started session-13.scope. Apr 12 18:23:21.952000 audit[4996]: USER_START pid=4996 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:21.966000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:21.975823 kernel: audit: type=1105 audit(1712946201.952:1422): pid=4996 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:21.975987 kernel: audit: type=1103 audit(1712946201.966:1423): pid=4998 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:22.196982 sshd[4996]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:22.198000 audit[4996]: USER_END pid=4996 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:22.211591 systemd[1]: sshd@12-172.31.20.40:22-139.178.89.65:59950.service: Deactivated successfully. Apr 12 18:23:22.213348 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:23:22.198000 audit[4996]: CRED_DISP pid=4996 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:22.222956 kernel: audit: type=1106 audit(1712946202.198:1424): pid=4996 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:22.223095 kernel: audit: type=1104 audit(1712946202.198:1425): pid=4996 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:22.223323 systemd-logind[1677]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:23:22.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.20.40:22-139.178.89.65:59950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:22.225050 systemd-logind[1677]: Removed session 13. Apr 12 18:23:27.236506 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:23:27.236662 kernel: audit: type=1130 audit(1712946207.225:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.20.40:22-139.178.89.65:42022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:27.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.20.40:22-139.178.89.65:42022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:27.225581 systemd[1]: Started sshd@13-172.31.20.40:22-139.178.89.65:42022.service. Apr 12 18:23:27.394000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.395964 sshd[5015]: Accepted publickey for core from 139.178.89.65 port 42022 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:27.399120 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:27.397000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.415898 kernel: audit: type=1101 audit(1712946207.394:1428): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.416319 kernel: audit: type=1103 audit(1712946207.397:1429): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.416403 kernel: audit: type=1006 audit(1712946207.397:1430): pid=5015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:23:27.397000 audit[5015]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffe3cb30 a2=3 a3=1 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:27.432480 kernel: audit: type=1300 audit(1712946207.397:1430): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffe3cb30 a2=3 a3=1 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:27.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:27.436122 kernel: audit: type=1327 audit(1712946207.397:1430): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:27.439836 systemd-logind[1677]: New session 14 of user core. Apr 12 18:23:27.440838 systemd[1]: Started session-14.scope. Apr 12 18:23:27.450000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.453000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.471372 kernel: audit: type=1105 audit(1712946207.450:1431): pid=5015 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.471469 kernel: audit: type=1103 audit(1712946207.453:1432): pid=5017 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.687193 sshd[5015]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:27.688000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.692206 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:23:27.693664 systemd[1]: sshd@13-172.31.20.40:22-139.178.89.65:42022.service: Deactivated successfully. Apr 12 18:23:27.702373 systemd-logind[1677]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:23:27.688000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.712539 kernel: audit: type=1106 audit(1712946207.688:1433): pid=5015 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.712660 kernel: audit: type=1104 audit(1712946207.688:1434): pid=5015 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:27.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.20.40:22-139.178.89.65:42022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:27.713546 systemd-logind[1677]: Removed session 14. Apr 12 18:23:32.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.20.40:22-139.178.89.65:42026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:32.718979 systemd[1]: Started sshd@14-172.31.20.40:22-139.178.89.65:42026.service. Apr 12 18:23:32.721476 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:23:32.721541 kernel: audit: type=1130 audit(1712946212.718:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.20.40:22-139.178.89.65:42026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:32.896000 audit[5033]: USER_ACCT pid=5033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:32.897902 sshd[5033]: Accepted publickey for core from 139.178.89.65 port 42026 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:32.910466 sshd[5033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:32.908000 audit[5033]: CRED_ACQ pid=5033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:32.920523 kernel: audit: type=1101 audit(1712946212.896:1437): pid=5033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:32.920690 kernel: audit: type=1103 audit(1712946212.908:1438): pid=5033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:32.927118 kernel: audit: type=1006 audit(1712946212.908:1439): pid=5033 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:23:32.933355 systemd-logind[1677]: New session 15 of user core. Apr 12 18:23:32.935007 systemd[1]: Started session-15.scope. Apr 12 18:23:32.908000 audit[5033]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0a46b90 a2=3 a3=1 items=0 ppid=1 pid=5033 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:32.947406 kernel: audit: type=1300 audit(1712946212.908:1439): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0a46b90 a2=3 a3=1 items=0 ppid=1 pid=5033 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:32.908000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:32.958980 kernel: audit: type=1327 audit(1712946212.908:1439): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:32.954000 audit[5033]: USER_START pid=5033 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:32.974149 kernel: audit: type=1105 audit(1712946212.954:1440): pid=5033 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:32.958000 audit[5035]: CRED_ACQ pid=5035 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:32.987925 kernel: audit: type=1103 audit(1712946212.958:1441): pid=5035 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:33.238424 sshd[5033]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:33.239000 audit[5033]: USER_END pid=5033 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:33.243477 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:23:33.244777 systemd[1]: sshd@14-172.31.20.40:22-139.178.89.65:42026.service: Deactivated successfully. Apr 12 18:23:33.240000 audit[5033]: CRED_DISP pid=5033 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:33.254426 systemd-logind[1677]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:23:33.263302 kernel: audit: type=1106 audit(1712946213.239:1442): pid=5033 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:33.263431 kernel: audit: type=1104 audit(1712946213.240:1443): pid=5033 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:33.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.20.40:22-139.178.89.65:42026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:33.264636 systemd-logind[1677]: Removed session 15. Apr 12 18:23:38.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.20.40:22-139.178.89.65:35632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:38.266428 systemd[1]: Started sshd@15-172.31.20.40:22-139.178.89.65:35632.service. Apr 12 18:23:38.268973 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:23:38.269054 kernel: audit: type=1130 audit(1712946218.265:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.20.40:22-139.178.89.65:35632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:38.440000 audit[5077]: USER_ACCT pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.441785 sshd[5077]: Accepted publickey for core from 139.178.89.65 port 35632 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:38.452980 kernel: audit: type=1101 audit(1712946218.440:1446): pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.452000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.459356 sshd[5077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:38.469053 kernel: audit: type=1103 audit(1712946218.452:1447): pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.469180 kernel: audit: type=1006 audit(1712946218.452:1448): pid=5077 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:23:38.452000 audit[5077]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3db1d80 a2=3 a3=1 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:38.480040 kernel: audit: type=1300 audit(1712946218.452:1448): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3db1d80 a2=3 a3=1 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:38.452000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:38.483761 kernel: audit: type=1327 audit(1712946218.452:1448): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:38.486316 systemd-logind[1677]: New session 16 of user core. Apr 12 18:23:38.488243 systemd[1]: Started session-16.scope. Apr 12 18:23:38.498000 audit[5077]: USER_START pid=5077 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.510926 kernel: audit: type=1105 audit(1712946218.498:1449): pid=5077 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.511070 kernel: audit: type=1103 audit(1712946218.499:1450): pid=5079 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.499000 audit[5079]: CRED_ACQ pid=5079 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.729176 sshd[5077]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:38.729000 audit[5077]: USER_END pid=5077 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.735184 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:23:38.736616 systemd[1]: sshd@15-172.31.20.40:22-139.178.89.65:35632.service: Deactivated successfully. Apr 12 18:23:38.732000 audit[5077]: CRED_DISP pid=5077 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.751840 kernel: audit: type=1106 audit(1712946218.729:1451): pid=5077 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.752004 kernel: audit: type=1104 audit(1712946218.732:1452): pid=5077 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:38.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.20.40:22-139.178.89.65:35632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:38.752616 systemd-logind[1677]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:23:38.754351 systemd-logind[1677]: Removed session 16. Apr 12 18:23:43.300584 kubelet[2811]: I0412 18:23:43.300537 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-wngv7" podStartSLOduration=65.223266388 podCreationTimestamp="2024-04-12 18:22:30 +0000 UTC" firstStartedPulling="2024-04-12 18:22:58.345201468 +0000 UTC m=+48.143049275" lastFinishedPulling="2024-04-12 18:23:06.422329511 +0000 UTC m=+56.220177318" observedRunningTime="2024-04-12 18:23:06.906256194 +0000 UTC m=+56.704104025" watchObservedRunningTime="2024-04-12 18:23:43.300394431 +0000 UTC m=+93.098242250" Apr 12 18:23:43.302780 kubelet[2811]: I0412 18:23:43.302714 2811 topology_manager.go:215] "Topology Admit Handler" podUID="ffbc98e2-fae0-4e0e-89be-f708ba13b096" podNamespace="calico-apiserver" podName="calico-apiserver-65fdd7db56-s5qv8" Apr 12 18:23:43.314741 systemd[1]: Created slice kubepods-besteffort-podffbc98e2_fae0_4e0e_89be_f708ba13b096.slice. Apr 12 18:23:43.327119 kubelet[2811]: W0412 18:23:43.327032 2811 reflector.go:535] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ip-172-31-20-40" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-20-40' and this object Apr 12 18:23:43.327515 kubelet[2811]: E0412 18:23:43.327429 2811 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ip-172-31-20-40" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-20-40' and this object Apr 12 18:23:43.393765 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:23:43.393965 kernel: audit: type=1325 audit(1712946223.390:1454): table=filter:112 family=2 entries=8 op=nft_register_rule pid=5110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.390000 audit[5110]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=5110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.390000 audit[5110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffee161a20 a2=0 a3=1 items=0 ppid=2950 pid=5110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.410673 kernel: audit: type=1300 audit(1712946223.390:1454): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffee161a20 a2=0 a3=1 items=0 ppid=2950 pid=5110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.416376 kernel: audit: type=1327 audit(1712946223.390:1454): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.398000 audit[5110]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=5110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.398000 audit[5110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffee161a20 a2=0 a3=1 items=0 ppid=2950 pid=5110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.435352 kernel: audit: type=1325 audit(1712946223.398:1455): table=nat:113 family=2 entries=20 op=nft_register_rule pid=5110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.435531 kernel: audit: type=1300 audit(1712946223.398:1455): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffee161a20 a2=0 a3=1 items=0 ppid=2950 pid=5110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.441087 kernel: audit: type=1327 audit(1712946223.398:1455): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.437000 audit[5112]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=5112 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.437000 audit[5112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff816ccb0 a2=0 a3=1 items=0 ppid=2950 pid=5112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.459421 kernel: audit: type=1325 audit(1712946223.437:1456): table=filter:114 family=2 entries=9 op=nft_register_rule pid=5112 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.459522 kernel: audit: type=1300 audit(1712946223.437:1456): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff816ccb0 a2=0 a3=1 items=0 ppid=2950 pid=5112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.443000 audit[5112]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=5112 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.471542 kernel: audit: type=1327 audit(1712946223.437:1456): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.471694 kernel: audit: type=1325 audit(1712946223.443:1457): table=nat:115 family=2 entries=20 op=nft_register_rule pid=5112 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.443000 audit[5112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff816ccb0 a2=0 a3=1 items=0 ppid=2950 pid=5112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.482433 kubelet[2811]: I0412 18:23:43.482304 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pdh8h\" (UniqueName: \"kubernetes.io/projected/ffbc98e2-fae0-4e0e-89be-f708ba13b096-kube-api-access-pdh8h\") pod \"calico-apiserver-65fdd7db56-s5qv8\" (UID: \"ffbc98e2-fae0-4e0e-89be-f708ba13b096\") " pod="calico-apiserver/calico-apiserver-65fdd7db56-s5qv8" Apr 12 18:23:43.482596 kubelet[2811]: I0412 18:23:43.482483 2811 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ffbc98e2-fae0-4e0e-89be-f708ba13b096-calico-apiserver-certs\") pod \"calico-apiserver-65fdd7db56-s5qv8\" (UID: \"ffbc98e2-fae0-4e0e-89be-f708ba13b096\") " pod="calico-apiserver/calico-apiserver-65fdd7db56-s5qv8" Apr 12 18:23:43.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.20.40:22-139.178.89.65:35640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:43.769135 systemd[1]: Started sshd@16-172.31.20.40:22-139.178.89.65:35640.service. Apr 12 18:23:43.937074 sshd[5115]: Accepted publickey for core from 139.178.89.65 port 35640 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:43.936000 audit[5115]: USER_ACCT pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:43.937000 audit[5115]: CRED_ACQ pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:43.938000 audit[5115]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9493cc0 a2=3 a3=1 items=0 ppid=1 pid=5115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:43.940172 sshd[5115]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:43.947542 systemd-logind[1677]: New session 17 of user core. Apr 12 18:23:43.949474 systemd[1]: Started session-17.scope. Apr 12 18:23:43.964000 audit[5115]: USER_START pid=5115 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:43.967000 audit[5117]: CRED_ACQ pid=5117 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:44.219704 env[1683]: time="2024-04-12T18:23:44.219638684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65fdd7db56-s5qv8,Uid:ffbc98e2-fae0-4e0e-89be-f708ba13b096,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:23:44.309010 sshd[5115]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:44.311000 audit[5115]: USER_END pid=5115 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:44.311000 audit[5115]: CRED_DISP pid=5115 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:44.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.20.40:22-139.178.89.65:35640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:44.316072 systemd-logind[1677]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:23:44.316474 systemd[1]: sshd@16-172.31.20.40:22-139.178.89.65:35640.service: Deactivated successfully. Apr 12 18:23:44.317821 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:23:44.321690 systemd-logind[1677]: Removed session 17. Apr 12 18:23:44.340277 systemd[1]: Started sshd@17-172.31.20.40:22-139.178.89.65:35642.service. Apr 12 18:23:44.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.20.40:22-139.178.89.65:35642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:44.541000 audit[5137]: USER_ACCT pid=5137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:44.543680 sshd[5137]: Accepted publickey for core from 139.178.89.65 port 35642 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:44.543000 audit[5137]: CRED_ACQ pid=5137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:44.545000 audit[5137]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb139c20 a2=3 a3=1 items=0 ppid=1 pid=5137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.545000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:44.547495 sshd[5137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:44.561241 systemd-logind[1677]: New session 18 of user core. Apr 12 18:23:44.562232 systemd[1]: Started session-18.scope. Apr 12 18:23:44.579000 audit[5137]: USER_START pid=5137 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:44.582665 systemd-networkd[1498]: calic4f4434a7cd: Link UP Apr 12 18:23:44.582000 audit[5147]: CRED_ACQ pid=5147 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:44.589758 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:23:44.590159 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic4f4434a7cd: link becomes ready Apr 12 18:23:44.590456 systemd-networkd[1498]: calic4f4434a7cd: Gained carrier Apr 12 18:23:44.594136 (udev-worker)[5148]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.369 [INFO][5125] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0 calico-apiserver-65fdd7db56- calico-apiserver ffbc98e2-fae0-4e0e-89be-f708ba13b096 1046 0 2024-04-12 18:23:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65fdd7db56 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-20-40 calico-apiserver-65fdd7db56-s5qv8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic4f4434a7cd [] []}} ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-s5qv8" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.369 [INFO][5125] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-s5qv8" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.455 [INFO][5141] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" HandleID="k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Workload="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.486 [INFO][5141] ipam_plugin.go 268: Auto assigning IP ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" HandleID="k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Workload="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000517950), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-20-40", "pod":"calico-apiserver-65fdd7db56-s5qv8", "timestamp":"2024-04-12 18:23:44.455218195 +0000 UTC"}, Hostname:"ip-172-31-20-40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.486 [INFO][5141] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.486 [INFO][5141] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.486 [INFO][5141] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-40' Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.490 [INFO][5141] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.510 [INFO][5141] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.518 [INFO][5141] ipam.go 489: Trying affinity for 192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.521 [INFO][5141] ipam.go 155: Attempting to load block cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.527 [INFO][5141] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.527 [INFO][5141] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.529 [INFO][5141] ipam.go 1682: Creating new handle: k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478 Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.536 [INFO][5141] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.567 [INFO][5141] ipam.go 1216: Successfully claimed IPs: [192.168.78.197/26] block=192.168.78.192/26 handle="k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.567 [INFO][5141] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.197/26] handle="k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" host="ip-172-31-20-40" Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.568 [INFO][5141] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:44.613663 env[1683]: 2024-04-12 18:23:44.568 [INFO][5141] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.197/26] IPv6=[] ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" HandleID="k8s-pod-network.432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Workload="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" Apr 12 18:23:44.615171 env[1683]: 2024-04-12 18:23:44.575 [INFO][5125] k8s.go 385: Populated endpoint ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-s5qv8" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0", GenerateName:"calico-apiserver-65fdd7db56-", Namespace:"calico-apiserver", SelfLink:"", UID:"ffbc98e2-fae0-4e0e-89be-f708ba13b096", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65fdd7db56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"", Pod:"calico-apiserver-65fdd7db56-s5qv8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.78.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic4f4434a7cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:44.615171 env[1683]: 2024-04-12 18:23:44.577 [INFO][5125] k8s.go 386: Calico CNI using IPs: [192.168.78.197/32] ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-s5qv8" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" Apr 12 18:23:44.615171 env[1683]: 2024-04-12 18:23:44.577 [INFO][5125] dataplane_linux.go 68: Setting the host side veth name to calic4f4434a7cd ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-s5qv8" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" Apr 12 18:23:44.615171 env[1683]: 2024-04-12 18:23:44.591 [INFO][5125] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-s5qv8" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" Apr 12 18:23:44.615171 env[1683]: 2024-04-12 18:23:44.592 [INFO][5125] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-s5qv8" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0", GenerateName:"calico-apiserver-65fdd7db56-", Namespace:"calico-apiserver", SelfLink:"", UID:"ffbc98e2-fae0-4e0e-89be-f708ba13b096", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65fdd7db56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-40", ContainerID:"432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478", Pod:"calico-apiserver-65fdd7db56-s5qv8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.78.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic4f4434a7cd", MAC:"66:e5:b7:c9:57:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:44.615171 env[1683]: 2024-04-12 18:23:44.606 [INFO][5125] k8s.go 498: Wrote updated endpoint to datastore ContainerID="432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-s5qv8" WorkloadEndpoint="ip--172--31--20--40-k8s-calico--apiserver--65fdd7db56--s5qv8-eth0" Apr 12 18:23:44.657496 env[1683]: time="2024-04-12T18:23:44.657341945Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:44.657708 env[1683]: time="2024-04-12T18:23:44.657442218Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:44.657708 env[1683]: time="2024-04-12T18:23:44.657514002Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:44.660381 env[1683]: time="2024-04-12T18:23:44.660141098Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478 pid=5168 runtime=io.containerd.runc.v2 Apr 12 18:23:44.710000 audit[5192]: NETFILTER_CFG table=filter:116 family=2 entries=59 op=nft_register_chain pid=5192 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:44.710000 audit[5192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30140 a0=3 a1=ffffc9671560 a2=0 a3=ffff93059fa8 items=0 ppid=3855 pid=5192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.710000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:44.728936 systemd[1]: Started cri-containerd-432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478.scope. Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.765000 audit: BPF prog-id=189 op=LOAD Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=5168 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433326634666334663539653631326362626464316539356561663831 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=5168 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433326634666334663539653631326362626464316539356561663831 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit: BPF prog-id=190 op=LOAD Apr 12 18:23:44.767000 audit[5184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=5168 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433326634666334663539653631326362626464316539356561663831 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit: BPF prog-id=191 op=LOAD Apr 12 18:23:44.767000 audit[5184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=5168 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433326634666334663539653631326362626464316539356561663831 Apr 12 18:23:44.767000 audit: BPF prog-id=191 op=UNLOAD Apr 12 18:23:44.767000 audit: BPF prog-id=190 op=UNLOAD Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.767000 audit: BPF prog-id=192 op=LOAD Apr 12 18:23:44.767000 audit[5184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=5168 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433326634666334663539653631326362626464316539356561663831 Apr 12 18:23:44.844787 env[1683]: time="2024-04-12T18:23:44.840408460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65fdd7db56-s5qv8,Uid:ffbc98e2-fae0-4e0e-89be-f708ba13b096,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478\"" Apr 12 18:23:44.854498 env[1683]: time="2024-04-12T18:23:44.854206512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:23:45.069604 sshd[5137]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:45.071000 audit[5137]: USER_END pid=5137 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:45.071000 audit[5137]: CRED_DISP pid=5137 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:45.075824 systemd-logind[1677]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:23:45.077587 systemd[1]: sshd@17-172.31.20.40:22-139.178.89.65:35642.service: Deactivated successfully. Apr 12 18:23:45.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.20.40:22-139.178.89.65:35642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:45.079241 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:23:45.080696 systemd-logind[1677]: Removed session 18. Apr 12 18:23:45.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.20.40:22-139.178.89.65:35648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:45.099062 systemd[1]: Started sshd@18-172.31.20.40:22-139.178.89.65:35648.service. Apr 12 18:23:45.206420 systemd[1]: run-containerd-runc-k8s.io-432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478-runc.LS0JNu.mount: Deactivated successfully. Apr 12 18:23:45.280000 audit[5214]: USER_ACCT pid=5214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:45.281477 sshd[5214]: Accepted publickey for core from 139.178.89.65 port 35648 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:45.282000 audit[5214]: CRED_ACQ pid=5214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:45.282000 audit[5214]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2b4bef0 a2=3 a3=1 items=0 ppid=1 pid=5214 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:45.282000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:45.284786 sshd[5214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:45.293877 systemd[1]: Started session-19.scope. Apr 12 18:23:45.295748 systemd-logind[1677]: New session 19 of user core. Apr 12 18:23:45.305000 audit[5214]: USER_START pid=5214 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:45.307000 audit[5216]: CRED_ACQ pid=5216 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:45.705132 systemd-networkd[1498]: calic4f4434a7cd: Gained IPv6LL Apr 12 18:23:46.024613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3871087757.mount: Deactivated successfully. Apr 12 18:23:47.017956 sshd[5214]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:47.019000 audit[5214]: USER_END pid=5214 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:47.020000 audit[5214]: CRED_DISP pid=5214 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:47.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.20.40:22-139.178.89.65:35648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:47.022809 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:23:47.023994 systemd[1]: sshd@18-172.31.20.40:22-139.178.89.65:35648.service: Deactivated successfully. Apr 12 18:23:47.032812 systemd-logind[1677]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:23:47.037204 systemd-logind[1677]: Removed session 19. Apr 12 18:23:47.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.20.40:22-139.178.89.65:55444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:47.045546 systemd[1]: Started sshd@19-172.31.20.40:22-139.178.89.65:55444.service. Apr 12 18:23:47.130000 audit[5230]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:47.130000 audit[5230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc7ce2240 a2=0 a3=1 items=0 ppid=2950 pid=5230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.130000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.146000 audit[5230]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:47.146000 audit[5230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc7ce2240 a2=0 a3=1 items=0 ppid=2950 pid=5230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.193000 audit[5233]: NETFILTER_CFG table=filter:119 family=2 entries=22 op=nft_register_rule pid=5233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:47.193000 audit[5233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffeaa572a0 a2=0 a3=1 items=0 ppid=2950 pid=5233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.199000 audit[5233]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:47.199000 audit[5233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffeaa572a0 a2=0 a3=1 items=0 ppid=2950 pid=5233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.256000 audit[5229]: USER_ACCT pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:47.257155 sshd[5229]: Accepted publickey for core from 139.178.89.65 port 55444 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:47.258000 audit[5229]: CRED_ACQ pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:47.258000 audit[5229]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0150bc0 a2=3 a3=1 items=0 ppid=1 pid=5229 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:47.260032 sshd[5229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:47.270805 systemd[1]: Started session-20.scope. Apr 12 18:23:47.272803 systemd-logind[1677]: New session 20 of user core. Apr 12 18:23:47.292000 audit[5229]: USER_START pid=5229 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:47.295000 audit[5234]: CRED_ACQ pid=5234 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.367437 sshd[5229]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:48.369000 audit[5229]: USER_END pid=5229 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.370000 audit[5229]: CRED_DISP pid=5229 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.20.40:22-139.178.89.65:55444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:48.373915 systemd[1]: sshd@19-172.31.20.40:22-139.178.89.65:55444.service: Deactivated successfully. Apr 12 18:23:48.375303 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:23:48.379266 systemd-logind[1677]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:23:48.383103 systemd-logind[1677]: Removed session 20. Apr 12 18:23:48.406193 kernel: kauditd_printk_skb: 118 callbacks suppressed Apr 12 18:23:48.406343 kernel: audit: type=1130 audit(1712946228.393:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.20.40:22-139.178.89.65:55448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:48.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.20.40:22-139.178.89.65:55448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:48.394505 systemd[1]: Started sshd@20-172.31.20.40:22-139.178.89.65:55448.service. Apr 12 18:23:48.539510 env[1683]: time="2024-04-12T18:23:48.539425223Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.543816 env[1683]: time="2024-04-12T18:23:48.543748474Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.547657 env[1683]: time="2024-04-12T18:23:48.547429755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.554004 env[1683]: time="2024-04-12T18:23:48.553930939Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.556940 env[1683]: time="2024-04-12T18:23:48.556879123Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:23:48.563497 env[1683]: time="2024-04-12T18:23:48.563407127Z" level=info msg="CreateContainer within sandbox \"432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:23:48.589000 audit[5242]: USER_ACCT pid=5242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.594397 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount510245083.mount: Deactivated successfully. Apr 12 18:23:48.593444 sshd[5242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:48.598072 sshd[5242]: Accepted publickey for core from 139.178.89.65 port 55448 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:48.589000 audit[5242]: CRED_ACQ pid=5242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.611076 kernel: audit: type=1101 audit(1712946228.589:1518): pid=5242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.611174 kernel: audit: type=1103 audit(1712946228.589:1519): pid=5242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.607535 systemd[1]: Started session-21.scope. Apr 12 18:23:48.608528 systemd-logind[1677]: New session 21 of user core. Apr 12 18:23:48.617320 kernel: audit: type=1006 audit(1712946228.589:1520): pid=5242 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:23:48.619520 env[1683]: time="2024-04-12T18:23:48.619294909Z" level=info msg="CreateContainer within sandbox \"432f4fc4f59e612cbbdd1e95eaf81b40234b5f96d91992449737506b0e29c478\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3f793b9c23ecf158ec83447522fffe22d56ec854dea29a5c71c42cfd74ffb7c8\"" Apr 12 18:23:48.633892 kernel: audit: type=1300 audit(1712946228.589:1520): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6b7b020 a2=3 a3=1 items=0 ppid=1 pid=5242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.589000 audit[5242]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6b7b020 a2=3 a3=1 items=0 ppid=1 pid=5242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.634265 env[1683]: time="2024-04-12T18:23:48.626830765Z" level=info msg="StartContainer for \"3f793b9c23ecf158ec83447522fffe22d56ec854dea29a5c71c42cfd74ffb7c8\"" Apr 12 18:23:48.589000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:48.639057 kernel: audit: type=1327 audit(1712946228.589:1520): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:48.621000 audit[5242]: USER_START pid=5242 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.650398 kernel: audit: type=1105 audit(1712946228.621:1521): pid=5242 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.668456 kernel: audit: type=1103 audit(1712946228.622:1522): pid=5244 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.622000 audit[5244]: CRED_ACQ pid=5244 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.694007 systemd[1]: Started cri-containerd-3f793b9c23ecf158ec83447522fffe22d56ec854dea29a5c71c42cfd74ffb7c8.scope. Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.762774 kernel: audit: type=1400 audit(1712946228.742:1523): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.762975 kernel: audit: type=1400 audit(1712946228.742:1524): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.743000 audit: BPF prog-id=193 op=LOAD Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5168 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373933623963323365636631353865633833343437353232666666 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5168 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373933623963323365636631353865633833343437353232666666 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit: BPF prog-id=194 op=LOAD Apr 12 18:23:48.753000 audit[5253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5168 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373933623963323365636631353865633833343437353232666666 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit: BPF prog-id=195 op=LOAD Apr 12 18:23:48.753000 audit[5253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5168 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373933623963323365636631353865633833343437353232666666 Apr 12 18:23:48.753000 audit: BPF prog-id=195 op=UNLOAD Apr 12 18:23:48.753000 audit: BPF prog-id=194 op=UNLOAD Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { perfmon } for pid=5253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit[5253]: AVC avc: denied { bpf } for pid=5253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.753000 audit: BPF prog-id=196 op=LOAD Apr 12 18:23:48.753000 audit[5253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5168 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373933623963323365636631353865633833343437353232666666 Apr 12 18:23:48.814547 env[1683]: time="2024-04-12T18:23:48.814461407Z" level=info msg="StartContainer for \"3f793b9c23ecf158ec83447522fffe22d56ec854dea29a5c71c42cfd74ffb7c8\" returns successfully" Apr 12 18:23:48.928303 sshd[5242]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:48.929000 audit[5242]: USER_END pid=5242 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.929000 audit[5242]: CRED_DISP pid=5242 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:48.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.20.40:22-139.178.89.65:55448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:48.933192 systemd[1]: sshd@20-172.31.20.40:22-139.178.89.65:55448.service: Deactivated successfully. Apr 12 18:23:48.934544 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:23:48.936826 systemd-logind[1677]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:23:48.938792 systemd-logind[1677]: Removed session 21. Apr 12 18:23:49.102000 audit[5297]: NETFILTER_CFG table=filter:121 family=2 entries=34 op=nft_register_rule pid=5297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:49.102000 audit[5297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=fffff7ef8fe0 a2=0 a3=1 items=0 ppid=2950 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:49.104000 audit[5297]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=5297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:49.104000 audit[5297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff7ef8fe0 a2=0 a3=1 items=0 ppid=2950 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:49.131000 audit[5299]: NETFILTER_CFG table=filter:123 family=2 entries=34 op=nft_register_rule pid=5299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:49.131000 audit[5299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffe4eab2b0 a2=0 a3=1 items=0 ppid=2950 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:49.133000 audit[5299]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=5299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:49.133000 audit[5299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe4eab2b0 a2=0 a3=1 items=0 ppid=2950 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:51.985000 audit[5265]: AVC avc: denied { watch } for pid=5265 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_23_44.1997526055/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c646 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c14,c646 tclass=file permissive=0 Apr 12 18:23:51.985000 audit[5265]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c2b240 a2=fc6 a3=0 items=0 ppid=5168 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c646 key=(null) Apr 12 18:23:51.985000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:23:53.959493 systemd[1]: Started sshd@21-172.31.20.40:22-139.178.89.65:55456.service. Apr 12 18:23:53.971546 kernel: kauditd_printk_skb: 73 callbacks suppressed Apr 12 18:23:53.971658 kernel: audit: type=1130 audit(1712946233.959:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.20.40:22-139.178.89.65:55456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:53.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.20.40:22-139.178.89.65:55456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:54.140000 audit[5307]: USER_ACCT pid=5307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.141244 sshd[5307]: Accepted publickey for core from 139.178.89.65 port 55456 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:54.144456 sshd[5307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:54.142000 audit[5307]: CRED_ACQ pid=5307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.160322 kernel: audit: type=1101 audit(1712946234.140:1550): pid=5307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.160919 kernel: audit: type=1103 audit(1712946234.142:1551): pid=5307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.161002 kernel: audit: type=1006 audit(1712946234.142:1552): pid=5307 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:23:54.142000 audit[5307]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde350e90 a2=3 a3=1 items=0 ppid=1 pid=5307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:54.176996 kernel: audit: type=1300 audit(1712946234.142:1552): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde350e90 a2=3 a3=1 items=0 ppid=1 pid=5307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:54.181442 kernel: audit: type=1327 audit(1712946234.142:1552): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:54.142000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:54.183291 systemd-logind[1677]: New session 22 of user core. Apr 12 18:23:54.184223 systemd[1]: Started session-22.scope. Apr 12 18:23:54.193000 audit[5307]: USER_START pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.207993 kernel: audit: type=1105 audit(1712946234.193:1553): pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.208138 kernel: audit: type=1103 audit(1712946234.206:1554): pid=5309 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.206000 audit[5309]: CRED_ACQ pid=5309 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.440717 sshd[5307]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:54.442000 audit[5307]: USER_END pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.446172 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:23:54.447685 systemd[1]: sshd@21-172.31.20.40:22-139.178.89.65:55456.service: Deactivated successfully. Apr 12 18:23:54.443000 audit[5307]: CRED_DISP pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.465212 kernel: audit: type=1106 audit(1712946234.442:1555): pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.465325 kernel: audit: type=1104 audit(1712946234.443:1556): pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:54.465413 systemd-logind[1677]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:23:54.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.20.40:22-139.178.89.65:55456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:54.467495 systemd-logind[1677]: Removed session 22. Apr 12 18:23:56.116000 audit[5321]: NETFILTER_CFG table=filter:125 family=2 entries=22 op=nft_register_rule pid=5321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:56.116000 audit[5321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe6bcc070 a2=0 a3=1 items=0 ppid=2950 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:56.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:56.121000 audit[5321]: NETFILTER_CFG table=nat:126 family=2 entries=104 op=nft_register_chain pid=5321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:56.121000 audit[5321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffe6bcc070 a2=0 a3=1 items=0 ppid=2950 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:56.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:59.474621 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:23:59.474936 kernel: audit: type=1130 audit(1712946239.469:1560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.20.40:22-139.178.89.65:52740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:59.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.20.40:22-139.178.89.65:52740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:59.470448 systemd[1]: Started sshd@22-172.31.20.40:22-139.178.89.65:52740.service. Apr 12 18:23:59.654000 audit[5330]: USER_ACCT pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.655324 sshd[5330]: Accepted publickey for core from 139.178.89.65 port 52740 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:23:59.666927 kernel: audit: type=1101 audit(1712946239.654:1561): pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.666000 audit[5330]: CRED_ACQ pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.668409 sshd[5330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:23:59.678329 systemd[1]: Started session-23.scope. Apr 12 18:23:59.680304 systemd-logind[1677]: New session 23 of user core. Apr 12 18:23:59.682425 kernel: audit: type=1103 audit(1712946239.666:1562): pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.682549 kernel: audit: type=1006 audit(1712946239.666:1563): pid=5330 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:23:59.666000 audit[5330]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff88bcc20 a2=3 a3=1 items=0 ppid=1 pid=5330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:59.693469 kernel: audit: type=1300 audit(1712946239.666:1563): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff88bcc20 a2=3 a3=1 items=0 ppid=1 pid=5330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:59.666000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:59.697456 kernel: audit: type=1327 audit(1712946239.666:1563): proctitle=737368643A20636F7265205B707269765D Apr 12 18:23:59.694000 audit[5330]: USER_START pid=5330 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.709646 kernel: audit: type=1105 audit(1712946239.694:1564): pid=5330 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.709000 audit[5332]: CRED_ACQ pid=5332 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.719884 kernel: audit: type=1103 audit(1712946239.709:1565): pid=5332 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.958556 sshd[5330]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:59.960000 audit[5330]: USER_END pid=5330 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.964812 systemd-logind[1677]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:23:59.967653 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:23:59.969813 systemd-logind[1677]: Removed session 23. Apr 12 18:23:59.960000 audit[5330]: CRED_DISP pid=5330 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.971586 systemd[1]: sshd@22-172.31.20.40:22-139.178.89.65:52740.service: Deactivated successfully. Apr 12 18:23:59.981097 kernel: audit: type=1106 audit(1712946239.960:1566): pid=5330 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.981315 kernel: audit: type=1104 audit(1712946239.960:1567): pid=5330 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:59.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.20.40:22-139.178.89.65:52740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:04.282000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:04.282000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002475260 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:24:04.282000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:04.283000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:04.283000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029007a0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:24:04.283000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:04.990130 systemd[1]: Started sshd@23-172.31.20.40:22-139.178.89.65:52754.service. Apr 12 18:24:05.001398 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:24:05.001520 kernel: audit: type=1130 audit(1712946244.989:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.20.40:22-139.178.89.65:52754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:04.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.20.40:22-139.178.89.65:52754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:05.207000 audit[5345]: USER_ACCT pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.211610 sshd[5345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:05.219063 sshd[5345]: Accepted publickey for core from 139.178.89.65 port 52754 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:05.207000 audit[5345]: CRED_ACQ pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.229036 kernel: audit: type=1101 audit(1712946245.207:1572): pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.229167 kernel: audit: type=1103 audit(1712946245.207:1573): pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.222538 systemd[1]: Started session-24.scope. Apr 12 18:24:05.225088 systemd-logind[1677]: New session 24 of user core. Apr 12 18:24:05.235696 kernel: audit: type=1006 audit(1712946245.207:1574): pid=5345 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:24:05.207000 audit[5345]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffeb77880 a2=3 a3=1 items=0 ppid=1 pid=5345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:05.246057 kernel: audit: type=1300 audit(1712946245.207:1574): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffeb77880 a2=3 a3=1 items=0 ppid=1 pid=5345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:05.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:05.250490 kernel: audit: type=1327 audit(1712946245.207:1574): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:05.245000 audit[5345]: USER_START pid=5345 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.262000 audit[5367]: CRED_ACQ pid=5367 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.274957 kernel: audit: type=1105 audit(1712946245.245:1575): pid=5345 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.275067 kernel: audit: type=1103 audit(1712946245.262:1576): pid=5367 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.541480 sshd[5345]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:05.543000 audit[5345]: USER_END pid=5345 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.547381 systemd-logind[1677]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:24:05.548723 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:24:05.549886 systemd[1]: sshd@23-172.31.20.40:22-139.178.89.65:52754.service: Deactivated successfully. Apr 12 18:24:05.552542 systemd-logind[1677]: Removed session 24. Apr 12 18:24:05.543000 audit[5345]: CRED_DISP pid=5345 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.564377 kernel: audit: type=1106 audit(1712946245.543:1577): pid=5345 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.564539 kernel: audit: type=1104 audit(1712946245.543:1578): pid=5345 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:05.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.20.40:22-139.178.89.65:52754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:05.833000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:05.833000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400354b800 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:24:05.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:05.840000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:05.840000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4003527f50 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:24:05.840000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:05.840000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:05.840000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4004d49280 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:24:05.840000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:05.845000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:05.845000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400354bfb0 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:24:05.845000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:05.872000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:05.872000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4008d47c80 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:24:05.872000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:05.873000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:05.873000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4006ccb170 a2=fc6 a3=0 items=0 ppid=2417 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c842 key=(null) Apr 12 18:24:05.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:24:09.922000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:09.922000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029015a0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:24:09.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:09.923000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:09.923000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029015c0 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:24:09.923000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:09.928000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:09.928000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002901760 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:24:09.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:09.929000 audit[2570]: AVC avc: denied { watch } for pid=2570 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:09.929000 audit[2570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40027c1260 a2=fc6 a3=0 items=0 ppid=2437 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:24:09.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:10.571487 systemd[1]: Started sshd@24-172.31.20.40:22-139.178.89.65:60504.service. Apr 12 18:24:10.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.20.40:22-139.178.89.65:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:10.574146 kernel: kauditd_printk_skb: 31 callbacks suppressed Apr 12 18:24:10.574290 kernel: audit: type=1130 audit(1712946250.570:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.20.40:22-139.178.89.65:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:10.757000 audit[5404]: USER_ACCT pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:10.760133 sshd[5404]: Accepted publickey for core from 139.178.89.65 port 60504 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:10.761758 sshd[5404]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:10.760000 audit[5404]: CRED_ACQ pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:10.774718 systemd[1]: Started session-25.scope. Apr 12 18:24:10.777544 kernel: audit: type=1101 audit(1712946250.757:1591): pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:10.777676 kernel: audit: type=1103 audit(1712946250.760:1592): pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:10.777811 systemd-logind[1677]: New session 25 of user core. Apr 12 18:24:10.784543 kernel: audit: type=1006 audit(1712946250.760:1593): pid=5404 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 18:24:10.784668 kernel: audit: type=1300 audit(1712946250.760:1593): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4bb1a90 a2=3 a3=1 items=0 ppid=1 pid=5404 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:10.760000 audit[5404]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4bb1a90 a2=3 a3=1 items=0 ppid=1 pid=5404 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:10.760000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:10.798165 kernel: audit: type=1327 audit(1712946250.760:1593): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:10.788000 audit[5404]: USER_START pid=5404 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:10.810313 kernel: audit: type=1105 audit(1712946250.788:1594): pid=5404 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:10.797000 audit[5407]: CRED_ACQ pid=5407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:10.819699 kernel: audit: type=1103 audit(1712946250.797:1595): pid=5407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:11.043237 sshd[5404]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:11.044000 audit[5404]: USER_END pid=5404 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:11.045000 audit[5404]: CRED_DISP pid=5404 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:11.057476 systemd[1]: sshd@24-172.31.20.40:22-139.178.89.65:60504.service: Deactivated successfully. Apr 12 18:24:11.066714 kernel: audit: type=1106 audit(1712946251.044:1596): pid=5404 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:11.066909 kernel: audit: type=1104 audit(1712946251.045:1597): pid=5404 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:11.058803 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:24:11.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.20.40:22-139.178.89.65:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:11.067565 systemd-logind[1677]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:24:11.069558 systemd-logind[1677]: Removed session 25. Apr 12 18:24:14.329000 audit[5456]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=5456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.329000 audit[5456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffee42fc0 a2=0 a3=1 items=0 ppid=2950 pid=5456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.329000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.337000 audit[5456]: NETFILTER_CFG table=nat:128 family=2 entries=51 op=nft_register_chain pid=5456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.337000 audit[5456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=fffffee42fc0 a2=0 a3=1 items=0 ppid=2950 pid=5456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.351136 kubelet[2811]: I0412 18:24:14.351067 2811 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65fdd7db56-s5qv8" podStartSLOduration=27.641320605 podCreationTimestamp="2024-04-12 18:23:43 +0000 UTC" firstStartedPulling="2024-04-12 18:23:44.847730027 +0000 UTC m=+94.645577834" lastFinishedPulling="2024-04-12 18:23:48.557392607 +0000 UTC m=+98.355240426" observedRunningTime="2024-04-12 18:23:49.054399056 +0000 UTC m=+98.852246875" watchObservedRunningTime="2024-04-12 18:24:14.350983197 +0000 UTC m=+124.148831040" Apr 12 18:24:14.384000 audit[5461]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.384000 audit[5461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffcd7f7c0 a2=0 a3=1 items=0 ppid=2950 pid=5461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.389000 audit[5461]: NETFILTER_CFG table=nat:130 family=2 entries=58 op=nft_register_chain pid=5461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.389000 audit[5461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=fffffcd7f7c0 a2=0 a3=1 items=0 ppid=2950 pid=5461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:16.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.20.40:22-139.178.89.65:60514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:16.076190 systemd[1]: Started sshd@25-172.31.20.40:22-139.178.89.65:60514.service. Apr 12 18:24:16.078926 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:24:16.078995 kernel: audit: type=1130 audit(1712946256.076:1603): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.20.40:22-139.178.89.65:60514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:16.255000 audit[5464]: USER_ACCT pid=5464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.256584 sshd[5464]: Accepted publickey for core from 139.178.89.65 port 60514 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:16.267910 kernel: audit: type=1101 audit(1712946256.255:1604): pid=5464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.268045 kernel: audit: type=1103 audit(1712946256.266:1605): pid=5464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.266000 audit[5464]: CRED_ACQ pid=5464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.269192 sshd[5464]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:16.283809 kernel: audit: type=1006 audit(1712946256.267:1606): pid=5464 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:24:16.267000 audit[5464]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4ed6b00 a2=3 a3=1 items=0 ppid=1 pid=5464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:16.294706 kernel: audit: type=1300 audit(1712946256.267:1606): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4ed6b00 a2=3 a3=1 items=0 ppid=1 pid=5464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:16.267000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:16.299145 kernel: audit: type=1327 audit(1712946256.267:1606): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:16.303789 systemd-logind[1677]: New session 26 of user core. Apr 12 18:24:16.305298 systemd[1]: Started session-26.scope. Apr 12 18:24:16.313000 audit[5464]: USER_START pid=5464 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.327991 kernel: audit: type=1105 audit(1712946256.313:1607): pid=5464 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.328157 kernel: audit: type=1103 audit(1712946256.326:1608): pid=5466 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.326000 audit[5466]: CRED_ACQ pid=5466 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.557506 sshd[5464]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:16.558000 audit[5464]: USER_END pid=5464 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.567437 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:24:16.568877 systemd[1]: sshd@25-172.31.20.40:22-139.178.89.65:60514.service: Deactivated successfully. Apr 12 18:24:16.564000 audit[5464]: CRED_DISP pid=5464 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.580676 kernel: audit: type=1106 audit(1712946256.558:1609): pid=5464 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.580805 kernel: audit: type=1104 audit(1712946256.564:1610): pid=5464 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:16.580915 systemd-logind[1677]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:24:16.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.20.40:22-139.178.89.65:60514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:16.582933 systemd-logind[1677]: Removed session 26. Apr 12 18:24:21.592239 systemd[1]: Started sshd@26-172.31.20.40:22-139.178.89.65:52870.service. Apr 12 18:24:21.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.20.40:22-139.178.89.65:52870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:21.594566 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:24:21.594679 kernel: audit: type=1130 audit(1712946261.591:1612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.20.40:22-139.178.89.65:52870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:21.773000 audit[5487]: USER_ACCT pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:21.775001 sshd[5487]: Accepted publickey for core from 139.178.89.65 port 52870 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:21.785000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:21.787589 sshd[5487]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:21.795818 kernel: audit: type=1101 audit(1712946261.773:1613): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:21.796048 kernel: audit: type=1103 audit(1712946261.785:1614): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:21.802039 kernel: audit: type=1006 audit(1712946261.786:1615): pid=5487 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 18:24:21.802232 kernel: audit: type=1300 audit(1712946261.786:1615): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed3dc0d0 a2=3 a3=1 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:21.786000 audit[5487]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed3dc0d0 a2=3 a3=1 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:21.786000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:21.816043 kernel: audit: type=1327 audit(1712946261.786:1615): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:21.824024 systemd-logind[1677]: New session 27 of user core. Apr 12 18:24:21.825083 systemd[1]: Started session-27.scope. Apr 12 18:24:21.835000 audit[5487]: USER_START pid=5487 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:21.838000 audit[5489]: CRED_ACQ pid=5489 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:21.856227 kernel: audit: type=1105 audit(1712946261.835:1616): pid=5487 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:21.856387 kernel: audit: type=1103 audit(1712946261.838:1617): pid=5489 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:22.088915 sshd[5487]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:22.091000 audit[5487]: USER_END pid=5487 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:22.102254 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:24:22.099000 audit[5487]: CRED_DISP pid=5487 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:22.105134 systemd[1]: sshd@26-172.31.20.40:22-139.178.89.65:52870.service: Deactivated successfully. Apr 12 18:24:22.112183 kernel: audit: type=1106 audit(1712946262.091:1618): pid=5487 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:22.112365 kernel: audit: type=1104 audit(1712946262.099:1619): pid=5487 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:22.112293 systemd-logind[1677]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:24:22.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.20.40:22-139.178.89.65:52870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:22.114599 systemd-logind[1677]: Removed session 27. Apr 12 18:24:27.121649 systemd[1]: Started sshd@27-172.31.20.40:22-139.178.89.65:39604.service. Apr 12 18:24:27.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.20.40:22-139.178.89.65:39604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:27.125162 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:24:27.125301 kernel: audit: type=1130 audit(1712946267.121:1621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.20.40:22-139.178.89.65:39604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:27.310000 audit[5504]: USER_ACCT pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.311475 sshd[5504]: Accepted publickey for core from 139.178.89.65 port 39604 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:24:27.314558 sshd[5504]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:24:27.312000 audit[5504]: CRED_ACQ pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.332306 kernel: audit: type=1101 audit(1712946267.310:1622): pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.332431 kernel: audit: type=1103 audit(1712946267.312:1623): pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.336956 systemd-logind[1677]: New session 28 of user core. Apr 12 18:24:27.339713 kernel: audit: type=1006 audit(1712946267.313:1624): pid=5504 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Apr 12 18:24:27.339846 kernel: audit: type=1300 audit(1712946267.313:1624): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd619f710 a2=3 a3=1 items=0 ppid=1 pid=5504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:27.313000 audit[5504]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd619f710 a2=3 a3=1 items=0 ppid=1 pid=5504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:27.340424 systemd[1]: Started session-28.scope. Apr 12 18:24:27.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:27.353419 kernel: audit: type=1327 audit(1712946267.313:1624): proctitle=737368643A20636F7265205B707269765D Apr 12 18:24:27.354000 audit[5504]: USER_START pid=5504 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.367539 kernel: audit: type=1105 audit(1712946267.354:1625): pid=5504 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.367000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.377916 kernel: audit: type=1103 audit(1712946267.367:1626): pid=5507 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.601496 sshd[5504]: pam_unix(sshd:session): session closed for user core Apr 12 18:24:27.602000 audit[5504]: USER_END pid=5504 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.607231 systemd-logind[1677]: Session 28 logged out. Waiting for processes to exit. Apr 12 18:24:27.608540 systemd[1]: session-28.scope: Deactivated successfully. Apr 12 18:24:27.609649 systemd[1]: sshd@27-172.31.20.40:22-139.178.89.65:39604.service: Deactivated successfully. Apr 12 18:24:27.612390 systemd-logind[1677]: Removed session 28. Apr 12 18:24:27.602000 audit[5504]: CRED_DISP pid=5504 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.624409 kernel: audit: type=1106 audit(1712946267.602:1627): pid=5504 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.624528 kernel: audit: type=1104 audit(1712946267.602:1628): pid=5504 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:24:27.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.20.40:22-139.178.89.65:39604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:24:41.448235 systemd[1]: cri-containerd-f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b.scope: Deactivated successfully. Apr 12 18:24:41.448771 systemd[1]: cri-containerd-f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b.scope: Consumed 5.041s CPU time. Apr 12 18:24:41.453000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:24:41.456468 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:24:41.456624 kernel: audit: type=1334 audit(1712946281.453:1630): prog-id=85 op=UNLOAD Apr 12 18:24:41.453000 audit: BPF prog-id=103 op=UNLOAD Apr 12 18:24:41.462615 kernel: audit: type=1334 audit(1712946281.453:1631): prog-id=103 op=UNLOAD Apr 12 18:24:41.502230 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b-rootfs.mount: Deactivated successfully. Apr 12 18:24:41.504184 env[1683]: time="2024-04-12T18:24:41.504096627Z" level=info msg="shim disconnected" id=f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b Apr 12 18:24:41.504767 env[1683]: time="2024-04-12T18:24:41.504181815Z" level=warning msg="cleaning up after shim disconnected" id=f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b namespace=k8s.io Apr 12 18:24:41.504767 env[1683]: time="2024-04-12T18:24:41.504206896Z" level=info msg="cleaning up dead shim" Apr 12 18:24:41.517406 env[1683]: time="2024-04-12T18:24:41.517326564Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:24:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5567 runtime=io.containerd.runc.v2\n" Apr 12 18:24:41.907403 systemd[1]: cri-containerd-7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d.scope: Deactivated successfully. Apr 12 18:24:41.908015 systemd[1]: cri-containerd-7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d.scope: Consumed 11.187s CPU time. Apr 12 18:24:41.907000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:24:41.912898 kernel: audit: type=1334 audit(1712946281.907:1632): prog-id=126 op=UNLOAD Apr 12 18:24:41.914000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:24:41.919931 kernel: audit: type=1334 audit(1712946281.914:1633): prog-id=129 op=UNLOAD Apr 12 18:24:41.947921 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d-rootfs.mount: Deactivated successfully. Apr 12 18:24:41.949541 env[1683]: time="2024-04-12T18:24:41.949479162Z" level=info msg="shim disconnected" id=7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d Apr 12 18:24:41.949879 env[1683]: time="2024-04-12T18:24:41.949819425Z" level=warning msg="cleaning up after shim disconnected" id=7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d namespace=k8s.io Apr 12 18:24:41.950037 env[1683]: time="2024-04-12T18:24:41.950008523Z" level=info msg="cleaning up dead shim" Apr 12 18:24:41.964591 env[1683]: time="2024-04-12T18:24:41.964533599Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:24:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5597 runtime=io.containerd.runc.v2\n" Apr 12 18:24:42.189357 kubelet[2811]: I0412 18:24:42.189301 2811 scope.go:117] "RemoveContainer" containerID="f487f598d256ead90daf1cda964b7ffad1221643508204263890f437146d221b" Apr 12 18:24:42.195879 kubelet[2811]: I0412 18:24:42.195280 2811 scope.go:117] "RemoveContainer" containerID="7aecaa2fc69d8d4969d5c84af71a59f83623667f0347b1d8792623882162965d" Apr 12 18:24:42.196489 env[1683]: time="2024-04-12T18:24:42.196393052Z" level=info msg="CreateContainer within sandbox \"1f6f558e409b1a9620286c4927c0ed48556fec08087c4ffaf9181c46a67c4e54\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Apr 12 18:24:42.200126 env[1683]: time="2024-04-12T18:24:42.200072256Z" level=info msg="CreateContainer within sandbox \"481133b51a1a2a387d3ce9ab416808eb38698335015a771464e283e2b7f394fb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Apr 12 18:24:42.236822 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4126047874.mount: Deactivated successfully. Apr 12 18:24:42.251155 env[1683]: time="2024-04-12T18:24:42.251076175Z" level=info msg="CreateContainer within sandbox \"481133b51a1a2a387d3ce9ab416808eb38698335015a771464e283e2b7f394fb\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"f1a8abf1db5b82350426254505e727bbe0b7afc7f9a9a27dfee10a87f6f722b4\"" Apr 12 18:24:42.252455 env[1683]: time="2024-04-12T18:24:42.252336200Z" level=info msg="StartContainer for \"f1a8abf1db5b82350426254505e727bbe0b7afc7f9a9a27dfee10a87f6f722b4\"" Apr 12 18:24:42.255347 env[1683]: time="2024-04-12T18:24:42.255290860Z" level=info msg="CreateContainer within sandbox \"1f6f558e409b1a9620286c4927c0ed48556fec08087c4ffaf9181c46a67c4e54\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"389a4c4d3991d1de704213888e09805bd5ed55c2a64285bf37f3330a25a44b53\"" Apr 12 18:24:42.256417 env[1683]: time="2024-04-12T18:24:42.256353675Z" level=info msg="StartContainer for \"389a4c4d3991d1de704213888e09805bd5ed55c2a64285bf37f3330a25a44b53\"" Apr 12 18:24:42.292462 systemd[1]: Started cri-containerd-f1a8abf1db5b82350426254505e727bbe0b7afc7f9a9a27dfee10a87f6f722b4.scope. Apr 12 18:24:42.306231 systemd[1]: Started cri-containerd-389a4c4d3991d1de704213888e09805bd5ed55c2a64285bf37f3330a25a44b53.scope. Apr 12 18:24:42.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349903 kernel: audit: type=1400 audit(1712946282.340:1634): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.365986 kernel: audit: type=1400 audit(1712946282.347:1635): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.366125 kernel: audit: type=1400 audit(1712946282.347:1636): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.373750 kernel: audit: type=1400 audit(1712946282.347:1637): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.374017 kernel: audit: type=1400 audit(1712946282.347:1638): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389260 kernel: audit: type=1400 audit(1712946282.347:1639): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.347000 audit: BPF prog-id=197 op=LOAD Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2973 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613861626631646235623832333530343236323534353035653732 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2973 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613861626631646235623832333530343236323534353035653732 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.348000 audit: BPF prog-id=198 op=LOAD Apr 12 18:24:42.348000 audit[5628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2973 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613861626631646235623832333530343236323534353035653732 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit: BPF prog-id=199 op=LOAD Apr 12 18:24:42.349000 audit[5628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2973 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613861626631646235623832333530343236323534353035653732 Apr 12 18:24:42.349000 audit: BPF prog-id=199 op=UNLOAD Apr 12 18:24:42.349000 audit: BPF prog-id=198 op=UNLOAD Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.349000 audit: BPF prog-id=200 op=LOAD Apr 12 18:24:42.349000 audit[5628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2973 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613861626631646235623832333530343236323534353035653732 Apr 12 18:24:42.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389000 audit[5629]: AVC avc: denied { bpf } for pid=5629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389000 audit[5629]: AVC avc: denied { bpf } for pid=5629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389000 audit[5629]: AVC avc: denied { bpf } for pid=5629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.389000 audit: BPF prog-id=203 op=LOAD Apr 12 18:24:42.389000 audit[5629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2437 pid=5629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338396134633464333939316431646537303432313338383865303938 Apr 12 18:24:42.405000 audit: BPF prog-id=203 op=UNLOAD Apr 12 18:24:42.405000 audit: BPF prog-id=202 op=UNLOAD Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { bpf } for pid=5629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { bpf } for pid=5629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { bpf } for pid=5629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { perfmon } for pid=5629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { bpf } for pid=5629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit[5629]: AVC avc: denied { bpf } for pid=5629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:42.405000 audit: BPF prog-id=204 op=LOAD Apr 12 18:24:42.405000 audit[5629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2437 pid=5629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:42.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338396134633464333939316431646537303432313338383865303938 Apr 12 18:24:42.427439 env[1683]: time="2024-04-12T18:24:42.427378573Z" level=info msg="StartContainer for \"f1a8abf1db5b82350426254505e727bbe0b7afc7f9a9a27dfee10a87f6f722b4\" returns successfully" Apr 12 18:24:42.465627 env[1683]: time="2024-04-12T18:24:42.465459733Z" level=info msg="StartContainer for \"389a4c4d3991d1de704213888e09805bd5ed55c2a64285bf37f3330a25a44b53\" returns successfully" Apr 12 18:24:42.505308 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2130274658.mount: Deactivated successfully. Apr 12 18:24:42.834474 systemd[1]: run-containerd-runc-k8s.io-1106ee4e1878ef4abea2a27c7c52f6cdc4268c8dda7b7427a297ab4dc979cb93-runc.KcRxCy.mount: Deactivated successfully. Apr 12 18:24:43.110720 kubelet[2811]: E0412 18:24:43.110328 2811 controller.go:193] "Failed to update lease" err="Put \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-40?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:24:44.261631 systemd[1]: run-containerd-runc-k8s.io-3f793b9c23ecf158ec83447522fffe22d56ec854dea29a5c71c42cfd74ffb7c8-runc.kWcmD5.mount: Deactivated successfully. Apr 12 18:24:45.262000 audit[5653]: AVC avc: denied { watch } for pid=5653 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:45.262000 audit[5653]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40007946f0 a2=fc6 a3=0 items=0 ppid=2437 pid=5653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:24:45.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:45.263000 audit[5653]: AVC avc: denied { watch } for pid=5653 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:24:45.263000 audit[5653]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000464340 a2=fc6 a3=0 items=0 ppid=2437 pid=5653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c907 key=(null) Apr 12 18:24:45.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:24:46.555241 systemd[1]: cri-containerd-9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5.scope: Deactivated successfully. Apr 12 18:24:46.555810 systemd[1]: cri-containerd-9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5.scope: Consumed 5.097s CPU time. Apr 12 18:24:46.558000 audit: BPF prog-id=93 op=UNLOAD Apr 12 18:24:46.561415 kernel: kauditd_printk_skb: 142 callbacks suppressed Apr 12 18:24:46.561533 kernel: audit: type=1334 audit(1712946286.558:1667): prog-id=93 op=UNLOAD Apr 12 18:24:46.558000 audit: BPF prog-id=96 op=UNLOAD Apr 12 18:24:46.566619 kernel: audit: type=1334 audit(1712946286.558:1668): prog-id=96 op=UNLOAD Apr 12 18:24:46.598725 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5-rootfs.mount: Deactivated successfully. Apr 12 18:24:46.600824 env[1683]: time="2024-04-12T18:24:46.600762260Z" level=info msg="shim disconnected" id=9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5 Apr 12 18:24:46.601612 env[1683]: time="2024-04-12T18:24:46.601565441Z" level=warning msg="cleaning up after shim disconnected" id=9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5 namespace=k8s.io Apr 12 18:24:46.601787 env[1683]: time="2024-04-12T18:24:46.601758307Z" level=info msg="cleaning up dead shim" Apr 12 18:24:46.615054 env[1683]: time="2024-04-12T18:24:46.614994894Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:24:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5736 runtime=io.containerd.runc.v2\n" Apr 12 18:24:47.216495 kubelet[2811]: I0412 18:24:47.216461 2811 scope.go:117] "RemoveContainer" containerID="9386817cbd46f13890e3b2c507639ce6089312acd5f753450dec24ddfb3d46f5" Apr 12 18:24:47.221240 env[1683]: time="2024-04-12T18:24:47.221178801Z" level=info msg="CreateContainer within sandbox \"aa6476f2ba3ee83fd334d2f4663fd7a576ef891aa47120da4f4986d49efb1580\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Apr 12 18:24:47.248054 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2072061538.mount: Deactivated successfully. Apr 12 18:24:47.253503 env[1683]: time="2024-04-12T18:24:47.253423726Z" level=info msg="CreateContainer within sandbox \"aa6476f2ba3ee83fd334d2f4663fd7a576ef891aa47120da4f4986d49efb1580\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"9fc754a80697709eace67bdca64b45adf0878da7bb080ef9df7413873e0f90cf\"" Apr 12 18:24:47.254772 env[1683]: time="2024-04-12T18:24:47.254712600Z" level=info msg="StartContainer for \"9fc754a80697709eace67bdca64b45adf0878da7bb080ef9df7413873e0f90cf\"" Apr 12 18:24:47.292618 systemd[1]: Started cri-containerd-9fc754a80697709eace67bdca64b45adf0878da7bb080ef9df7413873e0f90cf.scope. Apr 12 18:24:47.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338386 kernel: audit: type=1400 audit(1712946287.322:1669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338527 kernel: audit: type=1400 audit(1712946287.324:1670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338580 kernel: audit: type=1400 audit(1712946287.324:1671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345548 kernel: audit: type=1400 audit(1712946287.324:1672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.360645 kernel: audit: type=1400 audit(1712946287.324:1673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.376271 kernel: audit: type=1400 audit(1712946287.324:1674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.376407 kernel: audit: type=1400 audit(1712946287.324:1675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.384194 kernel: audit: type=1400 audit(1712946287.324:1676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.330000 audit: BPF prog-id=205 op=LOAD Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2405 pid=5758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:47.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633735346138303639373730396561636536376264636136346234 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2405 pid=5758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:47.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633735346138303639373730396561636536376264636136346234 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.331000 audit: BPF prog-id=206 op=LOAD Apr 12 18:24:47.331000 audit[5758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2405 pid=5758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:47.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633735346138303639373730396561636536376264636136346234 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.338000 audit: BPF prog-id=207 op=LOAD Apr 12 18:24:47.338000 audit[5758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2405 pid=5758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:47.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633735346138303639373730396561636536376264636136346234 Apr 12 18:24:47.344000 audit: BPF prog-id=207 op=UNLOAD Apr 12 18:24:47.345000 audit: BPF prog-id=206 op=UNLOAD Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { perfmon } for pid=5758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit[5758]: AVC avc: denied { bpf } for pid=5758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:47.345000 audit: BPF prog-id=208 op=LOAD Apr 12 18:24:47.345000 audit[5758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2405 pid=5758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:47.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633735346138303639373730396561636536376264636136346234 Apr 12 18:24:47.425590 env[1683]: time="2024-04-12T18:24:47.425494426Z" level=info msg="StartContainer for \"9fc754a80697709eace67bdca64b45adf0878da7bb080ef9df7413873e0f90cf\" returns successfully" Apr 12 18:24:51.987000 audit[5265]: AVC avc: denied { watch } for pid=5265 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_23_44.1997526055/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c646 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c14,c646 tclass=file permissive=0 Apr 12 18:24:51.990378 kernel: kauditd_printk_skb: 49 callbacks suppressed Apr 12 18:24:51.990468 kernel: audit: type=1400 audit(1712946291.987:1687): avc: denied { watch } for pid=5265 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_23_44.1997526055/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c646 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c14,c646 tclass=file permissive=0 Apr 12 18:24:51.987000 audit[5265]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001cec7a0 a2=fc6 a3=0 items=0 ppid=5168 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c646 key=(null) Apr 12 18:24:52.011923 kernel: audit: type=1300 audit(1712946291.987:1687): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001cec7a0 a2=fc6 a3=0 items=0 ppid=5168 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c646 key=(null) Apr 12 18:24:52.012094 kernel: audit: type=1327 audit(1712946291.987:1687): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:24:51.987000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274