Jul 2 07:51:45.328469 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:51:45.328517 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:51:45.328532 kernel: BIOS-provided physical RAM map: Jul 2 07:51:45.328542 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 2 07:51:45.328551 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 2 07:51:45.328561 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 2 07:51:45.328578 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Jul 2 07:51:45.328590 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Jul 2 07:51:45.328602 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Jul 2 07:51:45.328614 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 2 07:51:45.328627 kernel: NX (Execute Disable) protection: active Jul 2 07:51:45.328640 kernel: SMBIOS 2.7 present. Jul 2 07:51:45.328650 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Jul 2 07:51:45.328661 kernel: Hypervisor detected: KVM Jul 2 07:51:45.328677 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:51:45.328689 kernel: kvm-clock: cpu 0, msr 2f192001, primary cpu clock Jul 2 07:51:45.328703 kernel: kvm-clock: using sched offset of 7440928962 cycles Jul 2 07:51:45.328717 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:51:45.328731 kernel: tsc: Detected 2499.996 MHz processor Jul 2 07:51:45.328745 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:51:45.328763 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:51:45.328776 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Jul 2 07:51:45.328789 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:51:45.328801 kernel: Using GB pages for direct mapping Jul 2 07:51:45.328813 kernel: ACPI: Early table checksum verification disabled Jul 2 07:51:45.328826 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Jul 2 07:51:45.328838 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Jul 2 07:51:45.328851 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Jul 2 07:51:45.328864 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Jul 2 07:51:45.328880 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Jul 2 07:51:45.328894 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Jul 2 07:51:45.328906 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Jul 2 07:51:45.328920 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Jul 2 07:51:45.328933 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Jul 2 07:51:45.328946 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Jul 2 07:51:45.328959 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Jul 2 07:51:45.328972 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Jul 2 07:51:45.328988 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Jul 2 07:51:45.329000 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Jul 2 07:51:45.329014 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Jul 2 07:51:45.329033 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Jul 2 07:51:45.329046 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Jul 2 07:51:45.329059 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Jul 2 07:51:45.329074 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Jul 2 07:51:45.329090 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Jul 2 07:51:45.329105 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Jul 2 07:51:45.329119 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Jul 2 07:51:45.329133 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:51:45.329147 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:51:45.329161 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Jul 2 07:51:45.329175 kernel: NUMA: Initialized distance table, cnt=1 Jul 2 07:51:45.329189 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Jul 2 07:51:45.329206 kernel: Zone ranges: Jul 2 07:51:45.329220 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:51:45.329234 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Jul 2 07:51:45.329248 kernel: Normal empty Jul 2 07:51:45.329262 kernel: Movable zone start for each node Jul 2 07:51:45.329276 kernel: Early memory node ranges Jul 2 07:51:45.329289 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 2 07:51:45.329300 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Jul 2 07:51:45.333077 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Jul 2 07:51:45.333102 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:51:45.333117 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 2 07:51:45.333131 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Jul 2 07:51:45.333146 kernel: ACPI: PM-Timer IO Port: 0xb008 Jul 2 07:51:45.333160 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:51:45.333174 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Jul 2 07:51:45.333188 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:51:45.333203 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:51:45.333216 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:51:45.333233 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:51:45.333247 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:51:45.333261 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 07:51:45.333275 kernel: TSC deadline timer available Jul 2 07:51:45.333288 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:51:45.333303 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Jul 2 07:51:45.333317 kernel: Booting paravirtualized kernel on KVM Jul 2 07:51:45.333331 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:51:45.333346 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:51:45.333362 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:51:45.333376 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:51:45.335810 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:51:45.335834 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Jul 2 07:51:45.335848 kernel: kvm-guest: PV spinlocks enabled Jul 2 07:51:45.335863 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:51:45.335877 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Jul 2 07:51:45.335891 kernel: Policy zone: DMA32 Jul 2 07:51:45.335909 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:51:45.335928 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:51:45.335942 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 07:51:45.335956 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:51:45.335971 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:51:45.335986 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 123080K reserved, 0K cma-reserved) Jul 2 07:51:45.336001 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:51:45.336015 kernel: Kernel/User page tables isolation: enabled Jul 2 07:51:45.336026 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:51:45.336039 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:51:45.336050 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:51:45.336062 kernel: rcu: RCU event tracing is enabled. Jul 2 07:51:45.336073 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:51:45.336084 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:51:45.336097 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:51:45.336109 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:51:45.336121 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:51:45.336134 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 07:51:45.336148 kernel: random: crng init done Jul 2 07:51:45.336160 kernel: Console: colour VGA+ 80x25 Jul 2 07:51:45.336173 kernel: printk: console [ttyS0] enabled Jul 2 07:51:45.336188 kernel: ACPI: Core revision 20210730 Jul 2 07:51:45.336206 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Jul 2 07:51:45.336220 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:51:45.336234 kernel: x2apic enabled Jul 2 07:51:45.336247 kernel: Switched APIC routing to physical x2apic. Jul 2 07:51:45.336262 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Jul 2 07:51:45.336276 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Jul 2 07:51:45.336294 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 2 07:51:45.336308 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jul 2 07:51:45.336322 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:51:45.336347 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:51:45.336364 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:51:45.336378 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:51:45.336393 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Jul 2 07:51:45.336408 kernel: RETBleed: Vulnerable Jul 2 07:51:45.336422 kernel: Speculative Store Bypass: Vulnerable Jul 2 07:51:45.336460 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:51:45.336472 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:51:45.336483 kernel: GDS: Unknown: Dependent on hypervisor status Jul 2 07:51:45.336495 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:51:45.336511 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:51:45.336525 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:51:45.336538 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Jul 2 07:51:45.336553 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Jul 2 07:51:45.336567 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Jul 2 07:51:45.336581 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Jul 2 07:51:45.336598 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Jul 2 07:51:45.336612 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Jul 2 07:51:45.336626 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:51:45.336640 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Jul 2 07:51:45.336654 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Jul 2 07:51:45.336667 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Jul 2 07:51:45.336680 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Jul 2 07:51:45.336693 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Jul 2 07:51:45.336707 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Jul 2 07:51:45.336721 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Jul 2 07:51:45.336735 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:51:45.336752 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:51:45.336766 kernel: LSM: Security Framework initializing Jul 2 07:51:45.336780 kernel: SELinux: Initializing. Jul 2 07:51:45.336795 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 07:51:45.336809 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 07:51:45.336824 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8175M CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x4) Jul 2 07:51:45.336838 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Jul 2 07:51:45.336852 kernel: signal: max sigframe size: 3632 Jul 2 07:51:45.336867 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:51:45.336882 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:51:45.336896 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:51:45.336914 kernel: x86: Booting SMP configuration: Jul 2 07:51:45.336928 kernel: .... node #0, CPUs: #1 Jul 2 07:51:45.336943 kernel: kvm-clock: cpu 1, msr 2f192041, secondary cpu clock Jul 2 07:51:45.336958 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Jul 2 07:51:45.336973 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Jul 2 07:51:45.336988 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:51:45.337003 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:51:45.337017 kernel: smpboot: Max logical packages: 1 Jul 2 07:51:45.337034 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Jul 2 07:51:45.337048 kernel: devtmpfs: initialized Jul 2 07:51:45.337062 kernel: x86/mm: Memory block size: 128MB Jul 2 07:51:45.337076 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:51:45.337091 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:51:45.337106 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:51:45.337121 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:51:45.337135 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:51:45.337150 kernel: audit: type=2000 audit(1719906703.671:1): state=initialized audit_enabled=0 res=1 Jul 2 07:51:45.337168 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:51:45.337182 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:51:45.337197 kernel: cpuidle: using governor menu Jul 2 07:51:45.337211 kernel: ACPI: bus type PCI registered Jul 2 07:51:45.337226 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:51:45.337241 kernel: dca service started, version 1.12.1 Jul 2 07:51:45.337255 kernel: PCI: Using configuration type 1 for base access Jul 2 07:51:45.337270 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:51:45.337285 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:51:45.337845 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:51:45.337864 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:51:45.337875 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:51:45.337887 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:51:45.337899 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:51:45.337913 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:51:45.337926 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:51:45.337939 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:51:45.337950 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Jul 2 07:51:45.337967 kernel: ACPI: Interpreter enabled Jul 2 07:51:45.337979 kernel: ACPI: PM: (supports S0 S5) Jul 2 07:51:45.337991 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:51:45.338002 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:51:45.338014 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Jul 2 07:51:45.338028 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:51:45.338246 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:51:45.338379 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 07:51:45.338403 kernel: acpiphp: Slot [3] registered Jul 2 07:51:45.338417 kernel: acpiphp: Slot [4] registered Jul 2 07:51:45.338447 kernel: acpiphp: Slot [5] registered Jul 2 07:51:45.338460 kernel: acpiphp: Slot [6] registered Jul 2 07:51:45.338474 kernel: acpiphp: Slot [7] registered Jul 2 07:51:45.338488 kernel: acpiphp: Slot [8] registered Jul 2 07:51:45.338503 kernel: acpiphp: Slot [9] registered Jul 2 07:51:45.338515 kernel: acpiphp: Slot [10] registered Jul 2 07:51:45.338527 kernel: acpiphp: Slot [11] registered Jul 2 07:51:45.338543 kernel: acpiphp: Slot [12] registered Jul 2 07:51:45.338554 kernel: acpiphp: Slot [13] registered Jul 2 07:51:45.338567 kernel: acpiphp: Slot [14] registered Jul 2 07:51:45.338579 kernel: acpiphp: Slot [15] registered Jul 2 07:51:45.338591 kernel: acpiphp: Slot [16] registered Jul 2 07:51:45.338602 kernel: acpiphp: Slot [17] registered Jul 2 07:51:45.338614 kernel: acpiphp: Slot [18] registered Jul 2 07:51:45.338626 kernel: acpiphp: Slot [19] registered Jul 2 07:51:45.338638 kernel: acpiphp: Slot [20] registered Jul 2 07:51:45.338653 kernel: acpiphp: Slot [21] registered Jul 2 07:51:45.338665 kernel: acpiphp: Slot [22] registered Jul 2 07:51:45.338677 kernel: acpiphp: Slot [23] registered Jul 2 07:51:45.338689 kernel: acpiphp: Slot [24] registered Jul 2 07:51:45.338701 kernel: acpiphp: Slot [25] registered Jul 2 07:51:45.338713 kernel: acpiphp: Slot [26] registered Jul 2 07:51:45.338725 kernel: acpiphp: Slot [27] registered Jul 2 07:51:45.338738 kernel: acpiphp: Slot [28] registered Jul 2 07:51:45.338750 kernel: acpiphp: Slot [29] registered Jul 2 07:51:45.338762 kernel: acpiphp: Slot [30] registered Jul 2 07:51:45.338776 kernel: acpiphp: Slot [31] registered Jul 2 07:51:45.338790 kernel: PCI host bridge to bus 0000:00 Jul 2 07:51:45.338954 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:51:45.339067 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:51:45.339175 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:51:45.339283 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Jul 2 07:51:45.339390 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:51:45.339559 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:51:45.339697 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jul 2 07:51:45.342391 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Jul 2 07:51:45.342554 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Jul 2 07:51:45.342681 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Jul 2 07:51:45.342809 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Jul 2 07:51:45.342939 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Jul 2 07:51:45.343071 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Jul 2 07:51:45.343199 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Jul 2 07:51:45.343324 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Jul 2 07:51:45.343493 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Jul 2 07:51:45.343630 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Jul 2 07:51:45.347913 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Jul 2 07:51:45.348073 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Jul 2 07:51:45.348228 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 07:51:45.348384 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Jul 2 07:51:45.351312 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Jul 2 07:51:45.351591 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Jul 2 07:51:45.353396 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Jul 2 07:51:45.353422 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:51:45.353452 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:51:45.353461 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:51:45.353469 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:51:45.353478 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:51:45.353486 kernel: iommu: Default domain type: Translated Jul 2 07:51:45.353495 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:51:45.353602 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Jul 2 07:51:45.353689 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 07:51:45.353773 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Jul 2 07:51:45.353787 kernel: vgaarb: loaded Jul 2 07:51:45.353795 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:51:45.353804 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:51:45.353812 kernel: PTP clock support registered Jul 2 07:51:45.353820 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:51:45.353828 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:51:45.353837 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 2 07:51:45.353845 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Jul 2 07:51:45.353852 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Jul 2 07:51:45.353863 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Jul 2 07:51:45.353871 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:51:45.353880 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:51:45.353888 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:51:45.353896 kernel: pnp: PnP ACPI init Jul 2 07:51:45.353904 kernel: pnp: PnP ACPI: found 5 devices Jul 2 07:51:45.353912 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:51:45.353925 kernel: NET: Registered PF_INET protocol family Jul 2 07:51:45.353935 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 07:51:45.353944 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 2 07:51:45.353952 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:51:45.353960 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:51:45.353968 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 07:51:45.353977 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 2 07:51:45.354291 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 07:51:45.354303 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 07:51:45.354311 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:51:45.354324 kernel: NET: Registered PF_XDP protocol family Jul 2 07:51:45.354448 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:51:45.354529 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:51:45.354601 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:51:45.354675 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Jul 2 07:51:45.354761 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:51:45.354847 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Jul 2 07:51:45.354859 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:51:45.354871 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:51:45.354879 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Jul 2 07:51:45.354888 kernel: clocksource: Switched to clocksource tsc Jul 2 07:51:45.354897 kernel: Initialise system trusted keyrings Jul 2 07:51:45.354906 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 2 07:51:45.354914 kernel: Key type asymmetric registered Jul 2 07:51:45.354922 kernel: Asymmetric key parser 'x509' registered Jul 2 07:51:45.354930 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:51:45.354941 kernel: io scheduler mq-deadline registered Jul 2 07:51:45.354949 kernel: io scheduler kyber registered Jul 2 07:51:45.354957 kernel: io scheduler bfq registered Jul 2 07:51:45.354965 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:51:45.354974 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:51:45.354982 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:51:45.354990 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:51:45.354998 kernel: i8042: Warning: Keylock active Jul 2 07:51:45.355007 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:51:45.355015 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:51:45.355106 kernel: rtc_cmos 00:00: RTC can wake from S4 Jul 2 07:51:45.355184 kernel: rtc_cmos 00:00: registered as rtc0 Jul 2 07:51:45.355260 kernel: rtc_cmos 00:00: setting system clock to 2024-07-02T07:51:44 UTC (1719906704) Jul 2 07:51:45.355332 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Jul 2 07:51:45.355343 kernel: intel_pstate: CPU model not supported Jul 2 07:51:45.355351 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:51:45.355359 kernel: Segment Routing with IPv6 Jul 2 07:51:45.355370 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:51:45.355378 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:51:45.355386 kernel: Key type dns_resolver registered Jul 2 07:51:45.355394 kernel: IPI shorthand broadcast: enabled Jul 2 07:51:45.355403 kernel: sched_clock: Marking stable (449173659, 300189517)->(902118033, -152754857) Jul 2 07:51:45.355410 kernel: registered taskstats version 1 Jul 2 07:51:45.355418 kernel: Loading compiled-in X.509 certificates Jul 2 07:51:45.355427 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:51:45.355446 kernel: Key type .fscrypt registered Jul 2 07:51:45.355456 kernel: Key type fscrypt-provisioning registered Jul 2 07:51:45.355465 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:51:45.355473 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:51:45.355481 kernel: ima: No architecture policies found Jul 2 07:51:45.355489 kernel: clk: Disabling unused clocks Jul 2 07:51:45.355497 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:51:45.355505 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:51:45.355514 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:51:45.355522 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:51:45.355532 kernel: Run /init as init process Jul 2 07:51:45.355541 kernel: with arguments: Jul 2 07:51:45.355551 kernel: /init Jul 2 07:51:45.355559 kernel: with environment: Jul 2 07:51:45.355567 kernel: HOME=/ Jul 2 07:51:45.355575 kernel: TERM=linux Jul 2 07:51:45.355583 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:51:45.355595 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:51:45.355608 systemd[1]: Detected virtualization amazon. Jul 2 07:51:45.355617 systemd[1]: Detected architecture x86-64. Jul 2 07:51:45.355625 systemd[1]: Running in initrd. Jul 2 07:51:45.355634 systemd[1]: No hostname configured, using default hostname. Jul 2 07:51:45.355655 systemd[1]: Hostname set to . Jul 2 07:51:45.355666 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:51:45.355677 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:51:45.355686 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:51:45.355695 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:51:45.355704 systemd[1]: Reached target cryptsetup.target. Jul 2 07:51:45.355712 systemd[1]: Reached target paths.target. Jul 2 07:51:45.355721 systemd[1]: Reached target slices.target. Jul 2 07:51:45.355730 systemd[1]: Reached target swap.target. Jul 2 07:51:45.355738 systemd[1]: Reached target timers.target. Jul 2 07:51:45.355751 systemd[1]: Listening on iscsid.socket. Jul 2 07:51:45.355759 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:51:45.355768 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:51:45.355777 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:51:45.355786 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:51:45.355795 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:51:45.355804 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:51:45.355812 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:51:45.355824 systemd[1]: Reached target sockets.target. Jul 2 07:51:45.355832 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:51:45.355841 systemd[1]: Finished network-cleanup.service. Jul 2 07:51:45.355853 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:51:45.355861 systemd[1]: Starting systemd-journald.service... Jul 2 07:51:45.355870 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:51:45.355879 systemd[1]: Starting systemd-resolved.service... Jul 2 07:51:45.355887 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:51:45.355908 systemd-journald[185]: Journal started Jul 2 07:51:45.355964 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2648e41de18f27162e2efb2f99dff6) is 4.8M, max 38.7M, 33.9M free. Jul 2 07:51:45.389577 systemd[1]: Started systemd-journald.service. Jul 2 07:51:45.389647 kernel: audit: type=1130 audit(1719906705.361:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.363564 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:51:45.364942 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:51:45.371394 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:51:45.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.407449 kernel: audit: type=1130 audit(1719906705.363:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.410959 systemd-modules-load[186]: Inserted module 'overlay' Jul 2 07:51:45.709068 kernel: audit: type=1130 audit(1719906705.369:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.709111 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:51:45.709134 kernel: Bridge firewalling registered Jul 2 07:51:45.709153 kernel: SCSI subsystem initialized Jul 2 07:51:45.709169 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:51:45.709185 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:51:45.709205 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:51:45.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.419177 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:51:45.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.436300 systemd-resolved[187]: Positive Trust Anchors: Jul 2 07:51:45.736490 kernel: audit: type=1130 audit(1719906705.707:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.436316 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:51:45.769255 kernel: audit: type=1130 audit(1719906705.734:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.436374 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:51:45.796897 kernel: audit: type=1130 audit(1719906705.773:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.445108 systemd-resolved[187]: Defaulting to hostname 'linux'. Jul 2 07:51:45.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.523414 systemd-modules-load[186]: Inserted module 'br_netfilter' Jul 2 07:51:45.833056 kernel: audit: type=1130 audit(1719906705.800:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.591225 systemd-modules-load[186]: Inserted module 'dm_multipath' Jul 2 07:51:45.709350 systemd[1]: Started systemd-resolved.service. Jul 2 07:51:45.769286 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:51:45.774865 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:51:45.801955 systemd[1]: Reached target nss-lookup.target. Jul 2 07:51:45.835027 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:51:45.854253 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:51:45.888696 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:51:45.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.901474 kernel: audit: type=1130 audit(1719906705.887:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.902266 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:51:45.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.918645 kernel: audit: type=1130 audit(1719906705.910:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:45.920166 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:51:45.956993 dracut-cmdline[206]: dracut-dracut-053 Jul 2 07:51:45.960352 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:51:46.136579 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:51:46.159463 kernel: iscsi: registered transport (tcp) Jul 2 07:51:46.188483 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:51:46.188647 kernel: QLogic iSCSI HBA Driver Jul 2 07:51:46.239619 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:51:46.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:46.242885 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:51:46.298474 kernel: raid6: avx512x4 gen() 16760 MB/s Jul 2 07:51:46.316553 kernel: raid6: avx512x4 xor() 7145 MB/s Jul 2 07:51:46.333465 kernel: raid6: avx512x2 gen() 16687 MB/s Jul 2 07:51:46.351471 kernel: raid6: avx512x2 xor() 22273 MB/s Jul 2 07:51:46.369481 kernel: raid6: avx512x1 gen() 17651 MB/s Jul 2 07:51:46.386465 kernel: raid6: avx512x1 xor() 21356 MB/s Jul 2 07:51:46.404464 kernel: raid6: avx2x4 gen() 16623 MB/s Jul 2 07:51:46.422471 kernel: raid6: avx2x4 xor() 7010 MB/s Jul 2 07:51:46.440473 kernel: raid6: avx2x2 gen() 16921 MB/s Jul 2 07:51:46.457467 kernel: raid6: avx2x2 xor() 17020 MB/s Jul 2 07:51:46.475473 kernel: raid6: avx2x1 gen() 12257 MB/s Jul 2 07:51:46.493489 kernel: raid6: avx2x1 xor() 14592 MB/s Jul 2 07:51:46.511469 kernel: raid6: sse2x4 gen() 7854 MB/s Jul 2 07:51:46.529475 kernel: raid6: sse2x4 xor() 5707 MB/s Jul 2 07:51:46.547476 kernel: raid6: sse2x2 gen() 9461 MB/s Jul 2 07:51:46.565476 kernel: raid6: sse2x2 xor() 5808 MB/s Jul 2 07:51:46.582464 kernel: raid6: sse2x1 gen() 8866 MB/s Jul 2 07:51:46.601708 kernel: raid6: sse2x1 xor() 4294 MB/s Jul 2 07:51:46.601802 kernel: raid6: using algorithm avx512x1 gen() 17651 MB/s Jul 2 07:51:46.601830 kernel: raid6: .... xor() 21356 MB/s, rmw enabled Jul 2 07:51:46.603148 kernel: raid6: using avx512x2 recovery algorithm Jul 2 07:51:46.620478 kernel: xor: automatically using best checksumming function avx Jul 2 07:51:46.751471 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:51:46.761379 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:51:46.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:46.762000 audit: BPF prog-id=7 op=LOAD Jul 2 07:51:46.762000 audit: BPF prog-id=8 op=LOAD Jul 2 07:51:46.764622 systemd[1]: Starting systemd-udevd.service... Jul 2 07:51:46.781545 systemd-udevd[384]: Using default interface naming scheme 'v252'. Jul 2 07:51:46.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:46.788325 systemd[1]: Started systemd-udevd.service. Jul 2 07:51:46.790255 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:51:46.809356 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation Jul 2 07:51:46.841572 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:51:46.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:46.843882 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:51:46.908033 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:51:46.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:46.957457 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:51:46.997465 kernel: ena 0000:00:05.0: ENA device version: 0.10 Jul 2 07:51:46.997829 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Jul 2 07:51:47.001504 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Jul 2 07:51:47.013009 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:0f:a9:39:33:a5 Jul 2 07:51:47.015398 (udev-worker)[443]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:51:47.317510 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:51:47.317559 kernel: AES CTR mode by8 optimization enabled Jul 2 07:51:47.317590 kernel: nvme nvme0: pci function 0000:00:04.0 Jul 2 07:51:47.317821 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jul 2 07:51:47.317842 kernel: nvme nvme0: 2/0/0 default/read/poll queues Jul 2 07:51:47.317972 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:51:47.317992 kernel: GPT:9289727 != 16777215 Jul 2 07:51:47.318009 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:51:47.318026 kernel: GPT:9289727 != 16777215 Jul 2 07:51:47.318041 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:51:47.318061 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:51:47.318079 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (432) Jul 2 07:51:47.268192 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:51:47.335464 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:51:47.335626 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:51:47.365062 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:51:47.383549 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:51:47.385948 systemd[1]: Starting disk-uuid.service... Jul 2 07:51:47.400467 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:51:47.400697 disk-uuid[593]: Primary Header is updated. Jul 2 07:51:47.400697 disk-uuid[593]: Secondary Entries is updated. Jul 2 07:51:47.400697 disk-uuid[593]: Secondary Header is updated. Jul 2 07:51:47.409453 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:51:47.417463 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:51:48.422963 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:51:48.423129 disk-uuid[594]: The operation has completed successfully. Jul 2 07:51:48.563135 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:51:48.563253 systemd[1]: Finished disk-uuid.service. Jul 2 07:51:48.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:48.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:48.600024 systemd[1]: Starting verity-setup.service... Jul 2 07:51:48.663523 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:51:48.767815 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:51:48.770108 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:51:48.783519 systemd[1]: Finished verity-setup.service. Jul 2 07:51:48.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:48.940468 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:51:48.941040 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:51:48.942001 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:51:48.943193 systemd[1]: Starting ignition-setup.service... Jul 2 07:51:48.964315 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:51:49.007502 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:51:49.007573 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 07:51:49.007594 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 07:51:49.017472 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 07:51:49.033157 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:51:49.048313 systemd[1]: Finished ignition-setup.service. Jul 2 07:51:49.051588 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:51:49.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.092658 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:51:49.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.093000 audit: BPF prog-id=9 op=LOAD Jul 2 07:51:49.095653 systemd[1]: Starting systemd-networkd.service... Jul 2 07:51:49.149114 systemd-networkd[1106]: lo: Link UP Jul 2 07:51:49.149126 systemd-networkd[1106]: lo: Gained carrier Jul 2 07:51:49.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.149596 systemd-networkd[1106]: Enumeration completed Jul 2 07:51:49.162366 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:51:49.162414 kernel: audit: type=1130 audit(1719906709.151:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.149891 systemd-networkd[1106]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:51:49.151904 systemd[1]: Started systemd-networkd.service. Jul 2 07:51:49.153499 systemd[1]: Reached target network.target. Jul 2 07:51:49.171598 systemd-networkd[1106]: eth0: Link UP Jul 2 07:51:49.171604 systemd-networkd[1106]: eth0: Gained carrier Jul 2 07:51:49.172319 systemd[1]: Starting iscsiuio.service... Jul 2 07:51:49.197937 systemd[1]: Started iscsiuio.service. Jul 2 07:51:49.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.207461 kernel: audit: type=1130 audit(1719906709.198:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.207469 systemd-networkd[1106]: eth0: DHCPv4 address 172.31.20.226/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 2 07:51:49.211871 systemd[1]: Starting iscsid.service... Jul 2 07:51:49.225523 iscsid[1111]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:51:49.225523 iscsid[1111]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:51:49.225523 iscsid[1111]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:51:49.225523 iscsid[1111]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:51:49.225523 iscsid[1111]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:51:49.245363 iscsid[1111]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:51:49.247667 systemd[1]: Started iscsid.service. Jul 2 07:51:49.257417 kernel: audit: type=1130 audit(1719906709.248:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.255556 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:51:49.277331 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:51:49.288269 kernel: audit: type=1130 audit(1719906709.277:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.279108 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:51:49.287748 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:51:49.292867 systemd[1]: Reached target remote-fs.target. Jul 2 07:51:49.307501 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:51:49.337104 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:51:49.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.358657 kernel: audit: type=1130 audit(1719906709.340:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.451318 ignition[1062]: Ignition 2.14.0 Jul 2 07:51:49.451331 ignition[1062]: Stage: fetch-offline Jul 2 07:51:49.451481 ignition[1062]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:51:49.451534 ignition[1062]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:51:49.467008 ignition[1062]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:51:49.470087 ignition[1062]: Ignition finished successfully Jul 2 07:51:49.472272 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:51:49.488511 kernel: audit: type=1130 audit(1719906709.473:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.486979 systemd[1]: Starting ignition-fetch.service... Jul 2 07:51:49.508511 ignition[1130]: Ignition 2.14.0 Jul 2 07:51:49.508526 ignition[1130]: Stage: fetch Jul 2 07:51:49.508974 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:51:49.509055 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:51:49.523619 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:51:49.525462 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:51:49.603128 ignition[1130]: INFO : PUT result: OK Jul 2 07:51:49.619505 ignition[1130]: DEBUG : parsed url from cmdline: "" Jul 2 07:51:49.619505 ignition[1130]: INFO : no config URL provided Jul 2 07:51:49.619505 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:51:49.619505 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" Jul 2 07:51:49.627362 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:51:49.627362 ignition[1130]: INFO : PUT result: OK Jul 2 07:51:49.645082 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Jul 2 07:51:49.654422 ignition[1130]: INFO : GET result: OK Jul 2 07:51:49.656942 ignition[1130]: DEBUG : parsing config with SHA512: 62b59cd73c1e84a33ed0c872e387b1aa8d25f8d4dc54cda4d74cacf458530c4a105897b8c7142b71e21e22d46c2b8c948dbf3b3f9d15bcf5777c2285672a3b4f Jul 2 07:51:49.673983 unknown[1130]: fetched base config from "system" Jul 2 07:51:49.674000 unknown[1130]: fetched base config from "system" Jul 2 07:51:49.674007 unknown[1130]: fetched user config from "aws" Jul 2 07:51:49.677911 ignition[1130]: fetch: fetch complete Jul 2 07:51:49.677923 ignition[1130]: fetch: fetch passed Jul 2 07:51:49.677990 ignition[1130]: Ignition finished successfully Jul 2 07:51:49.683023 systemd[1]: Finished ignition-fetch.service. Jul 2 07:51:49.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.687266 systemd[1]: Starting ignition-kargs.service... Jul 2 07:51:49.697502 kernel: audit: type=1130 audit(1719906709.684:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.722598 ignition[1136]: Ignition 2.14.0 Jul 2 07:51:49.722614 ignition[1136]: Stage: kargs Jul 2 07:51:49.722822 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:51:49.722857 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:51:49.752050 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:51:49.757832 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:51:49.760366 ignition[1136]: INFO : PUT result: OK Jul 2 07:51:49.764175 ignition[1136]: kargs: kargs passed Jul 2 07:51:49.764367 ignition[1136]: Ignition finished successfully Jul 2 07:51:49.766977 systemd[1]: Finished ignition-kargs.service. Jul 2 07:51:49.774748 kernel: audit: type=1130 audit(1719906709.766:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.768854 systemd[1]: Starting ignition-disks.service... Jul 2 07:51:49.778403 ignition[1142]: Ignition 2.14.0 Jul 2 07:51:49.778414 ignition[1142]: Stage: disks Jul 2 07:51:49.778676 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:51:49.778714 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:51:49.789302 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:51:49.790872 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:51:49.793134 ignition[1142]: INFO : PUT result: OK Jul 2 07:51:49.796408 ignition[1142]: disks: disks passed Jul 2 07:51:49.796539 ignition[1142]: Ignition finished successfully Jul 2 07:51:49.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.797449 systemd[1]: Finished ignition-disks.service. Jul 2 07:51:49.799037 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:51:49.809558 kernel: audit: type=1130 audit(1719906709.797:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.812859 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:51:49.815754 systemd[1]: Reached target local-fs.target. Jul 2 07:51:49.819743 systemd[1]: Reached target sysinit.target. Jul 2 07:51:49.822514 systemd[1]: Reached target basic.target. Jul 2 07:51:49.826078 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:51:49.849714 systemd-fsck[1150]: ROOT: clean, 614/553520 files, 56020/553472 blocks Jul 2 07:51:49.859140 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:51:49.869364 kernel: audit: type=1130 audit(1719906709.859:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:49.863723 systemd[1]: Mounting sysroot.mount... Jul 2 07:51:49.884466 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:51:49.886096 systemd[1]: Mounted sysroot.mount. Jul 2 07:51:49.888885 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:51:49.894018 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:51:49.898129 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 07:51:49.898219 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:51:49.898252 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:51:49.908159 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:51:49.929652 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:51:49.932418 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:51:49.944487 initrd-setup-root[1172]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:51:49.952689 initrd-setup-root[1180]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:51:49.959388 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1167) Jul 2 07:51:49.965611 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:51:49.965686 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 07:51:49.965707 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 07:51:49.965732 initrd-setup-root[1188]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:51:49.973653 initrd-setup-root[1212]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:51:49.978464 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 07:51:49.983924 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:51:50.067097 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:51:50.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:50.069981 systemd[1]: Starting ignition-mount.service... Jul 2 07:51:50.079523 systemd[1]: Starting sysroot-boot.service... Jul 2 07:51:50.086668 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:51:50.086801 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:51:50.120566 systemd[1]: Finished sysroot-boot.service. Jul 2 07:51:50.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:50.124886 ignition[1234]: INFO : Ignition 2.14.0 Jul 2 07:51:50.124886 ignition[1234]: INFO : Stage: mount Jul 2 07:51:50.127341 ignition[1234]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:51:50.127341 ignition[1234]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:51:50.142893 ignition[1234]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:51:50.149738 ignition[1234]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:51:50.153229 ignition[1234]: INFO : PUT result: OK Jul 2 07:51:50.157296 ignition[1234]: INFO : mount: mount passed Jul 2 07:51:50.159171 ignition[1234]: INFO : Ignition finished successfully Jul 2 07:51:50.161871 systemd[1]: Finished ignition-mount.service. Jul 2 07:51:50.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:50.163920 systemd[1]: Starting ignition-files.service... Jul 2 07:51:50.183385 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:51:50.213493 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1242) Jul 2 07:51:50.218460 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:51:50.218549 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 07:51:50.218572 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 07:51:50.235477 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 07:51:50.245163 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:51:50.268882 ignition[1261]: INFO : Ignition 2.14.0 Jul 2 07:51:50.268882 ignition[1261]: INFO : Stage: files Jul 2 07:51:50.272264 ignition[1261]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:51:50.272264 ignition[1261]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:51:50.280483 systemd-networkd[1106]: eth0: Gained IPv6LL Jul 2 07:51:50.290481 ignition[1261]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:51:50.293076 ignition[1261]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:51:50.295669 ignition[1261]: INFO : PUT result: OK Jul 2 07:51:50.300477 ignition[1261]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:51:50.306354 ignition[1261]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:51:50.306354 ignition[1261]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:51:50.311828 ignition[1261]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:51:50.313609 ignition[1261]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:51:50.316571 unknown[1261]: wrote ssh authorized keys file for user: core Jul 2 07:51:50.318112 ignition[1261]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:51:50.320788 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:51:50.323389 ignition[1261]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 07:51:50.386152 ignition[1261]: INFO : GET result: OK Jul 2 07:51:50.493856 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:51:50.496569 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 2 07:51:50.496569 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:51:50.507995 ignition[1261]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1376767692" Jul 2 07:51:50.513468 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1264) Jul 2 07:51:50.513505 ignition[1261]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1376767692": device or resource busy Jul 2 07:51:50.513505 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1376767692", trying btrfs: device or resource busy Jul 2 07:51:50.513505 ignition[1261]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1376767692" Jul 2 07:51:50.513505 ignition[1261]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1376767692" Jul 2 07:51:50.522355 ignition[1261]: INFO : op(3): [started] unmounting "/mnt/oem1376767692" Jul 2 07:51:50.522355 ignition[1261]: INFO : op(3): [finished] unmounting "/mnt/oem1376767692" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:51:50.522355 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 2 07:51:50.583656 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:51:50.583656 ignition[1261]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem157614475" Jul 2 07:51:50.583656 ignition[1261]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem157614475": device or resource busy Jul 2 07:51:50.583656 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem157614475", trying btrfs: device or resource busy Jul 2 07:51:50.583656 ignition[1261]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem157614475" Jul 2 07:51:50.583656 ignition[1261]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem157614475" Jul 2 07:51:50.583656 ignition[1261]: INFO : op(6): [started] unmounting "/mnt/oem157614475" Jul 2 07:51:50.583656 ignition[1261]: INFO : op(6): [finished] unmounting "/mnt/oem157614475" Jul 2 07:51:50.583656 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 2 07:51:50.583656 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 2 07:51:50.583656 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:51:50.628502 ignition[1261]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem784350832" Jul 2 07:51:50.628502 ignition[1261]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem784350832": device or resource busy Jul 2 07:51:50.628502 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem784350832", trying btrfs: device or resource busy Jul 2 07:51:50.628502 ignition[1261]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem784350832" Jul 2 07:51:50.628502 ignition[1261]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem784350832" Jul 2 07:51:50.628502 ignition[1261]: INFO : op(9): [started] unmounting "/mnt/oem784350832" Jul 2 07:51:50.628502 ignition[1261]: INFO : op(9): [finished] unmounting "/mnt/oem784350832" Jul 2 07:51:50.628502 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 2 07:51:50.628502 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:51:50.628502 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:51:50.663617 ignition[1261]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3232577322" Jul 2 07:51:50.683589 ignition[1261]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3232577322": device or resource busy Jul 2 07:51:50.683589 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3232577322", trying btrfs: device or resource busy Jul 2 07:51:50.683589 ignition[1261]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3232577322" Jul 2 07:51:50.727886 ignition[1261]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3232577322" Jul 2 07:51:50.737074 ignition[1261]: INFO : op(c): [started] unmounting "/mnt/oem3232577322" Jul 2 07:51:50.737074 ignition[1261]: INFO : op(c): [finished] unmounting "/mnt/oem3232577322" Jul 2 07:51:50.737074 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:51:50.744194 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:51:50.744194 ignition[1261]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Jul 2 07:51:51.185379 ignition[1261]: INFO : GET result: OK Jul 2 07:51:51.916703 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:51:51.916703 ignition[1261]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:51:51.916703 ignition[1261]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(12): [started] processing unit "nvidia.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(12): [finished] processing unit "nvidia.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(16): [started] setting preset to enabled for "amazon-ssm-agent.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(16): [finished] setting preset to enabled for "amazon-ssm-agent.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Jul 2 07:51:51.939083 ignition[1261]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 07:51:52.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.035879 ignition[1261]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:51:52.035879 ignition[1261]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:51:52.035879 ignition[1261]: INFO : files: files passed Jul 2 07:51:52.035879 ignition[1261]: INFO : Ignition finished successfully Jul 2 07:51:52.000600 systemd[1]: Finished ignition-files.service. Jul 2 07:51:52.113517 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:51:52.123730 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:51:52.124937 systemd[1]: Starting ignition-quench.service... Jul 2 07:51:52.146053 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:51:52.146231 systemd[1]: Finished ignition-quench.service. Jul 2 07:51:52.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.153960 initrd-setup-root-after-ignition[1286]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:51:52.154897 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:51:52.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.162809 systemd[1]: Reached target ignition-complete.target. Jul 2 07:51:52.167114 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:51:52.208081 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:51:52.208215 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:51:52.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.217338 systemd[1]: Reached target initrd-fs.target. Jul 2 07:51:52.219350 systemd[1]: Reached target initrd.target. Jul 2 07:51:52.223739 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:51:52.226398 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:51:52.248197 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:51:52.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.259510 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:51:52.284563 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:51:52.293213 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:51:52.295874 systemd[1]: Stopped target timers.target. Jul 2 07:51:52.296320 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:51:52.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.296736 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:51:52.299584 systemd[1]: Stopped target initrd.target. Jul 2 07:51:52.301688 systemd[1]: Stopped target basic.target. Jul 2 07:51:52.305671 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:51:52.307966 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:51:52.310365 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:51:52.313153 systemd[1]: Stopped target remote-fs.target. Jul 2 07:51:52.315427 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:51:52.317902 systemd[1]: Stopped target sysinit.target. Jul 2 07:51:52.320773 systemd[1]: Stopped target local-fs.target. Jul 2 07:51:52.323115 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:51:52.325604 systemd[1]: Stopped target swap.target. Jul 2 07:51:52.325798 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:51:52.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.325991 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:51:52.326514 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:51:52.326787 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:51:52.326958 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:51:52.327411 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:51:52.327608 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:51:52.328523 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:51:52.366814 ignition[1299]: INFO : Ignition 2.14.0 Jul 2 07:51:52.366814 ignition[1299]: INFO : Stage: umount Jul 2 07:51:52.366814 ignition[1299]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:51:52.366814 ignition[1299]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:51:52.366814 ignition[1299]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:51:52.366814 ignition[1299]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:51:52.366814 ignition[1299]: INFO : PUT result: OK Jul 2 07:51:52.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.328681 systemd[1]: Stopped ignition-files.service. Jul 2 07:51:52.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.387780 ignition[1299]: INFO : umount: umount passed Jul 2 07:51:52.387780 ignition[1299]: INFO : Ignition finished successfully Jul 2 07:51:52.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.330087 systemd[1]: Stopping ignition-mount.service... Jul 2 07:51:52.330492 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:51:52.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.330738 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:51:52.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.332449 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:51:52.332917 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:51:52.333110 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:51:52.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.333390 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:51:52.333548 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:51:52.337020 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:51:52.337128 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:51:52.368566 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:51:52.375039 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:51:52.375182 systemd[1]: Stopped ignition-mount.service. Jul 2 07:51:52.382127 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:51:52.382329 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:51:52.385375 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:51:52.385489 systemd[1]: Stopped ignition-disks.service. Jul 2 07:51:52.388031 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:51:52.388227 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:51:52.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.392850 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:51:52.394276 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:51:52.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.397059 systemd[1]: Stopped target network.target. Jul 2 07:51:52.399518 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:51:52.406307 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:51:52.409630 systemd[1]: Stopped target paths.target. Jul 2 07:51:52.412174 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:51:52.414756 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:51:52.418651 systemd[1]: Stopped target slices.target. Jul 2 07:51:52.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.421312 systemd[1]: Stopped target sockets.target. Jul 2 07:51:52.423628 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:51:52.423679 systemd[1]: Closed iscsid.socket. Jul 2 07:51:52.427469 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:51:52.427515 systemd[1]: Closed iscsiuio.socket. Jul 2 07:51:52.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.430889 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:51:52.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.430969 systemd[1]: Stopped ignition-setup.service. Jul 2 07:51:52.434483 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:51:52.434623 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:51:52.439874 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:51:52.443943 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:51:52.448531 systemd-networkd[1106]: eth0: DHCPv6 lease lost Jul 2 07:51:52.482000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:51:52.450045 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:51:52.450186 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:51:52.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.453057 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:51:52.453115 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:51:52.457127 systemd[1]: Stopping network-cleanup.service... Jul 2 07:51:52.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.463314 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:51:52.463399 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:51:52.465176 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:51:52.465252 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:51:52.544000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:51:52.467727 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:51:52.467792 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:51:52.473628 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:51:52.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.482925 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:51:52.483986 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:51:52.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.488911 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:51:52.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.515534 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:51:52.515749 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:51:52.545926 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:51:52.546000 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:51:52.549657 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:51:52.549725 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:51:52.550803 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:51:52.550909 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:51:52.552033 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:51:52.552285 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:51:52.555859 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:51:52.555909 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:51:52.574851 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:51:52.587155 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:51:52.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.587400 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:51:52.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:52.590477 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:51:52.590701 systemd[1]: Stopped network-cleanup.service. Jul 2 07:51:52.592699 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:51:52.592920 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:51:52.595560 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:51:52.605949 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:51:52.635629 systemd[1]: Switching root. Jul 2 07:51:52.665678 systemd-journald[185]: Journal stopped Jul 2 07:51:56.715500 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Jul 2 07:51:56.715709 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:51:56.715741 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:51:56.716337 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:51:56.716359 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:51:56.716376 kernel: SELinux: policy capability open_perms=1 Jul 2 07:51:56.716394 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:51:56.716411 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:51:56.716429 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:51:56.717411 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:51:56.717464 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:51:56.717495 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:51:56.717514 systemd[1]: Successfully loaded SELinux policy in 71.187ms. Jul 2 07:51:56.717547 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.320ms. Jul 2 07:51:56.717569 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:51:56.717589 systemd[1]: Detected virtualization amazon. Jul 2 07:51:56.717608 systemd[1]: Detected architecture x86-64. Jul 2 07:51:56.717631 systemd[1]: Detected first boot. Jul 2 07:51:56.717653 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:51:56.717671 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:51:56.717693 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:51:56.717714 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:51:56.717737 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:51:56.717760 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:51:56.717782 kernel: kauditd_printk_skb: 59 callbacks suppressed Jul 2 07:51:56.717907 kernel: audit: type=1334 audit(1719906716.311:86): prog-id=12 op=LOAD Jul 2 07:51:56.717931 kernel: audit: type=1334 audit(1719906716.311:87): prog-id=3 op=UNLOAD Jul 2 07:51:56.718038 kernel: audit: type=1334 audit(1719906716.313:88): prog-id=13 op=LOAD Jul 2 07:51:56.718059 kernel: audit: type=1334 audit(1719906716.314:89): prog-id=14 op=LOAD Jul 2 07:51:56.718077 kernel: audit: type=1334 audit(1719906716.314:90): prog-id=4 op=UNLOAD Jul 2 07:51:56.718095 kernel: audit: type=1334 audit(1719906716.314:91): prog-id=5 op=UNLOAD Jul 2 07:51:56.718113 kernel: audit: type=1334 audit(1719906716.316:92): prog-id=15 op=LOAD Jul 2 07:51:56.718136 kernel: audit: type=1334 audit(1719906716.316:93): prog-id=12 op=UNLOAD Jul 2 07:51:56.718163 kernel: audit: type=1334 audit(1719906716.319:94): prog-id=16 op=LOAD Jul 2 07:51:56.718182 kernel: audit: type=1334 audit(1719906716.323:95): prog-id=17 op=LOAD Jul 2 07:51:56.718203 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:51:56.718224 systemd[1]: Stopped iscsiuio.service. Jul 2 07:51:56.718244 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:51:56.718269 systemd[1]: Stopped iscsid.service. Jul 2 07:51:56.718290 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:51:56.718310 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:51:56.718336 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:51:56.718358 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:51:56.718377 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:51:56.718398 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 07:51:56.718416 systemd[1]: Created slice system-getty.slice. Jul 2 07:51:56.720517 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:51:56.720557 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:51:56.720586 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:51:56.720605 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:51:56.720627 systemd[1]: Created slice user.slice. Jul 2 07:51:56.720646 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:51:56.720667 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:51:56.720687 systemd[1]: Set up automount boot.automount. Jul 2 07:51:56.720708 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:51:56.720729 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:51:56.720749 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:51:56.720772 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:51:56.720792 systemd[1]: Reached target integritysetup.target. Jul 2 07:51:56.720812 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:51:56.720833 systemd[1]: Reached target remote-fs.target. Jul 2 07:51:56.720853 systemd[1]: Reached target slices.target. Jul 2 07:51:56.720873 systemd[1]: Reached target swap.target. Jul 2 07:51:56.720890 systemd[1]: Reached target torcx.target. Jul 2 07:51:56.720916 systemd[1]: Reached target veritysetup.target. Jul 2 07:51:56.720938 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:51:56.720958 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:51:56.720983 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:51:56.721003 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:51:56.721024 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:51:56.721044 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:51:56.721065 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:51:56.721087 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:51:56.721108 systemd[1]: Mounting media.mount... Jul 2 07:51:56.721129 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:51:56.721150 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:51:56.721174 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:51:56.721195 systemd[1]: Mounting tmp.mount... Jul 2 07:51:56.721215 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:51:56.721236 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:51:56.721256 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:51:56.721277 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:51:56.721297 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:51:56.721317 systemd[1]: Starting modprobe@drm.service... Jul 2 07:51:56.721338 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:51:56.721361 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:51:56.721382 systemd[1]: Starting modprobe@loop.service... Jul 2 07:51:56.721403 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:51:56.721424 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:51:56.721463 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:51:56.721484 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:51:56.721505 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:51:56.721526 systemd[1]: Stopped systemd-journald.service. Jul 2 07:51:56.721547 systemd[1]: Starting systemd-journald.service... Jul 2 07:51:56.721570 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:51:56.721591 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:51:56.721612 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:51:56.721643 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:51:56.721666 kernel: loop: module loaded Jul 2 07:51:56.721690 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:51:56.721838 systemd[1]: Stopped verity-setup.service. Jul 2 07:51:56.721865 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:51:56.721887 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:51:56.721907 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:51:56.721927 systemd[1]: Mounted media.mount. Jul 2 07:51:56.721948 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:51:56.721969 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:51:56.721990 systemd[1]: Mounted tmp.mount. Jul 2 07:51:56.722013 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:51:56.722033 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:51:56.722054 kernel: fuse: init (API version 7.34) Jul 2 07:51:56.722074 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:51:56.722095 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:51:56.722116 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:51:56.722139 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:51:56.722169 systemd[1]: Finished modprobe@drm.service. Jul 2 07:51:56.722190 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:51:56.722211 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:51:56.722232 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:51:56.722263 systemd-journald[1411]: Journal started Jul 2 07:51:56.722342 systemd-journald[1411]: Runtime Journal (/run/log/journal/ec2648e41de18f27162e2efb2f99dff6) is 4.8M, max 38.7M, 33.9M free. Jul 2 07:51:52.948000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:51:56.726088 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:51:53.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:51:53.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:51:53.033000 audit: BPF prog-id=10 op=LOAD Jul 2 07:51:53.033000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:51:53.033000 audit: BPF prog-id=11 op=LOAD Jul 2 07:51:53.033000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:51:53.183000 audit[1335]: AVC avc: denied { associate } for pid=1335 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:51:53.183000 audit[1335]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1318 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:51:53.183000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:51:53.190000 audit[1335]: AVC avc: denied { associate } for pid=1335 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:51:53.190000 audit[1335]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1318 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:51:53.190000 audit: CWD cwd="/" Jul 2 07:51:53.190000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:53.190000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:53.190000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:51:56.311000 audit: BPF prog-id=12 op=LOAD Jul 2 07:51:56.311000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:51:56.313000 audit: BPF prog-id=13 op=LOAD Jul 2 07:51:56.314000 audit: BPF prog-id=14 op=LOAD Jul 2 07:51:56.314000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:51:56.314000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:51:56.316000 audit: BPF prog-id=15 op=LOAD Jul 2 07:51:56.316000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:51:56.319000 audit: BPF prog-id=16 op=LOAD Jul 2 07:51:56.323000 audit: BPF prog-id=17 op=LOAD Jul 2 07:51:56.323000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:51:56.323000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:51:56.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.331000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:51:56.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.606000 audit: BPF prog-id=18 op=LOAD Jul 2 07:51:56.606000 audit: BPF prog-id=19 op=LOAD Jul 2 07:51:56.606000 audit: BPF prog-id=20 op=LOAD Jul 2 07:51:56.729851 systemd[1]: Started systemd-journald.service. Jul 2 07:51:56.606000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:51:56.606000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:51:56.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.710000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:51:56.710000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc891793f0 a2=4000 a3=7ffc8917948c items=0 ppid=1 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:51:56.710000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:51:56.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.310518 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:51:56.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:53.178288 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:51:56.325742 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:51:53.179666 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:51:56.729712 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:51:53.179699 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:51:56.731683 systemd[1]: Finished modprobe@loop.service. Jul 2 07:51:53.179881 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:51:56.733649 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:51:53.179900 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:51:56.735982 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:51:53.179951 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:51:56.739410 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:51:53.179974 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:51:56.741453 systemd[1]: Reached target network-pre.target. Jul 2 07:51:53.180460 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:51:56.746296 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:51:53.180528 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:51:56.749518 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:51:53.180547 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:51:56.750635 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:51:53.183636 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:51:56.753595 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:51:53.183695 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:51:56.757353 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:51:53.183724 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:51:56.758665 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:51:53.183745 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:51:56.760338 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:51:53.183771 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:51:56.761554 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:51:53.183791 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:51:56.763203 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:51:55.726040 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:51:56.767057 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:51:55.726508 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:51:56.769218 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:51:55.726673 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:51:55.727051 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:51:55.727115 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:51:55.727178 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-07-02T07:51:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:51:56.791032 systemd-journald[1411]: Time spent on flushing to /var/log/journal/ec2648e41de18f27162e2efb2f99dff6 is 126.496ms for 1185 entries. Jul 2 07:51:56.791032 systemd-journald[1411]: System Journal (/var/log/journal/ec2648e41de18f27162e2efb2f99dff6) is 8.0M, max 195.6M, 187.6M free. Jul 2 07:51:56.931847 systemd-journald[1411]: Received client request to flush runtime journal. Jul 2 07:51:56.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.789989 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:51:56.793237 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:51:56.834771 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:51:56.932637 udevadm[1450]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 07:51:56.876920 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:51:56.882970 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:51:56.902452 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:51:56.906237 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:51:56.933378 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:51:56.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:56.959714 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:51:56.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:57.904107 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:51:57.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:57.904000 audit: BPF prog-id=21 op=LOAD Jul 2 07:51:57.904000 audit: BPF prog-id=22 op=LOAD Jul 2 07:51:57.904000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:51:57.904000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:51:57.906955 systemd[1]: Starting systemd-udevd.service... Jul 2 07:51:57.933576 systemd-udevd[1452]: Using default interface naming scheme 'v252'. Jul 2 07:51:57.998851 systemd[1]: Started systemd-udevd.service. Jul 2 07:51:57.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:58.001000 audit: BPF prog-id=23 op=LOAD Jul 2 07:51:58.004370 systemd[1]: Starting systemd-networkd.service... Jul 2 07:51:58.028000 audit: BPF prog-id=24 op=LOAD Jul 2 07:51:58.028000 audit: BPF prog-id=25 op=LOAD Jul 2 07:51:58.028000 audit: BPF prog-id=26 op=LOAD Jul 2 07:51:58.032073 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:51:58.141681 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:51:58.158701 systemd[1]: Started systemd-userdbd.service. Jul 2 07:51:58.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:58.192645 (udev-worker)[1453]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:51:58.264009 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:51:58.278415 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:51:58.278547 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Jul 2 07:51:58.304477 kernel: ACPI: button: Sleep Button [SLPF] Jul 2 07:51:58.310863 systemd-networkd[1461]: lo: Link UP Jul 2 07:51:58.310876 systemd-networkd[1461]: lo: Gained carrier Jul 2 07:51:58.312335 systemd-networkd[1461]: Enumeration completed Jul 2 07:51:58.312480 systemd[1]: Started systemd-networkd.service. Jul 2 07:51:58.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:58.316659 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:51:58.319085 systemd-networkd[1461]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:51:58.325501 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:51:58.325809 systemd-networkd[1461]: eth0: Link UP Jul 2 07:51:58.326136 systemd-networkd[1461]: eth0: Gained carrier Jul 2 07:51:58.337740 systemd-networkd[1461]: eth0: DHCPv4 address 172.31.20.226/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 2 07:51:58.328000 audit[1465]: AVC avc: denied { confidentiality } for pid=1465 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:51:58.328000 audit[1465]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564e7d6a9df0 a1=3207c a2=7f1997760bc5 a3=5 items=108 ppid=1452 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:51:58.328000 audit: CWD cwd="/" Jul 2 07:51:58.328000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=1 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=2 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=3 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=4 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=5 name=(null) inode=14618 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=6 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=7 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=8 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=9 name=(null) inode=14620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=10 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=11 name=(null) inode=14621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=12 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=13 name=(null) inode=14622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=14 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=15 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=16 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=17 name=(null) inode=14624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=18 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=19 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=20 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=21 name=(null) inode=14626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=22 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=23 name=(null) inode=14627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=24 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=25 name=(null) inode=14628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=26 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=27 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=28 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=29 name=(null) inode=14630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=30 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=31 name=(null) inode=14631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=32 name=(null) inode=14631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=33 name=(null) inode=14632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=34 name=(null) inode=14631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=35 name=(null) inode=14633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=36 name=(null) inode=14631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=37 name=(null) inode=14634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=38 name=(null) inode=14631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=39 name=(null) inode=14635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=40 name=(null) inode=14631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=41 name=(null) inode=14636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=42 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=43 name=(null) inode=14637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=44 name=(null) inode=14637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=45 name=(null) inode=14638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=46 name=(null) inode=14637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=47 name=(null) inode=14639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=48 name=(null) inode=14637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=49 name=(null) inode=14640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=50 name=(null) inode=14637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=51 name=(null) inode=14641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=52 name=(null) inode=14637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=53 name=(null) inode=14642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=55 name=(null) inode=14643 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=56 name=(null) inode=14643 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=57 name=(null) inode=14644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=58 name=(null) inode=14643 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=59 name=(null) inode=14645 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=60 name=(null) inode=14643 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=61 name=(null) inode=14646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=62 name=(null) inode=14646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=63 name=(null) inode=14647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=64 name=(null) inode=14646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=65 name=(null) inode=14648 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=66 name=(null) inode=14646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=67 name=(null) inode=14649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=68 name=(null) inode=14646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=69 name=(null) inode=14650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.376446 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1459) Jul 2 07:51:58.328000 audit: PATH item=70 name=(null) inode=14646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=71 name=(null) inode=14651 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=72 name=(null) inode=14643 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=73 name=(null) inode=14652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=74 name=(null) inode=14652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=75 name=(null) inode=14653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=76 name=(null) inode=14652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=77 name=(null) inode=14654 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=78 name=(null) inode=14652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=79 name=(null) inode=14655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=80 name=(null) inode=14652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=81 name=(null) inode=14656 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=82 name=(null) inode=14652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=83 name=(null) inode=14657 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=84 name=(null) inode=14643 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=85 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=86 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=87 name=(null) inode=14659 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=88 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=89 name=(null) inode=14660 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=90 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=91 name=(null) inode=14661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=92 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=93 name=(null) inode=14662 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=94 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=95 name=(null) inode=14663 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=96 name=(null) inode=14643 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=97 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=98 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=99 name=(null) inode=14665 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=100 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=101 name=(null) inode=14666 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=102 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=103 name=(null) inode=14667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=104 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=105 name=(null) inode=14668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=106 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PATH item=107 name=(null) inode=14669 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:51:58.328000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:51:58.416510 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Jul 2 07:51:58.442467 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Jul 2 07:51:58.469503 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:51:58.583500 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:51:58.730926 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:51:58.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:58.733609 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:51:58.774129 lvm[1566]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:51:58.808674 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:51:58.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:58.810305 systemd[1]: Reached target cryptsetup.target. Jul 2 07:51:58.812799 systemd[1]: Starting lvm2-activation.service... Jul 2 07:51:58.833735 lvm[1567]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:51:58.884744 systemd[1]: Finished lvm2-activation.service. Jul 2 07:51:58.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:58.888495 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:51:58.889883 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:51:58.889918 systemd[1]: Reached target local-fs.target. Jul 2 07:51:58.891423 systemd[1]: Reached target machines.target. Jul 2 07:51:58.895428 systemd[1]: Starting ldconfig.service... Jul 2 07:51:58.899702 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:51:58.899890 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:51:58.902409 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:51:58.907548 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:51:58.912942 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:51:58.916381 systemd[1]: Starting systemd-sysext.service... Jul 2 07:51:58.923933 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1569 (bootctl) Jul 2 07:51:58.925897 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:51:58.945606 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:51:58.958702 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:51:58.958954 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:51:58.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:58.976903 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:51:58.983468 kernel: loop0: detected capacity change from 0 to 210664 Jul 2 07:51:59.121947 systemd-fsck[1580]: fsck.fat 4.2 (2021-01-31) Jul 2 07:51:59.121947 systemd-fsck[1580]: /dev/nvme0n1p1: 789 files, 119238/258078 clusters Jul 2 07:51:59.124369 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:51:59.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.127919 systemd[1]: Mounting boot.mount... Jul 2 07:51:59.143464 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:51:59.159882 systemd[1]: Mounted boot.mount. Jul 2 07:51:59.171464 kernel: loop1: detected capacity change from 0 to 210664 Jul 2 07:51:59.212246 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:51:59.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.224474 (sd-sysext)[1590]: Using extensions 'kubernetes'. Jul 2 07:51:59.226766 (sd-sysext)[1590]: Merged extensions into '/usr'. Jul 2 07:51:59.277528 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:51:59.281634 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:51:59.289878 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:51:59.300206 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:51:59.322824 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:51:59.336516 systemd[1]: Starting modprobe@loop.service... Jul 2 07:51:59.338670 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:51:59.339696 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:51:59.339864 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:51:59.345200 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:51:59.346809 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:51:59.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.346949 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:51:59.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.350621 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:51:59.350749 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:51:59.353878 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:51:59.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.354009 systemd[1]: Finished modprobe@loop.service. Jul 2 07:51:59.361854 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:51:59.361977 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:51:59.364182 systemd[1]: Finished systemd-sysext.service. Jul 2 07:51:59.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:51:59.369179 systemd[1]: Starting ensure-sysext.service... Jul 2 07:51:59.394975 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:51:59.429955 systemd[1]: Reloading. Jul 2 07:51:59.537799 systemd-tmpfiles[1602]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:51:59.549801 systemd-tmpfiles[1602]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:51:59.565947 systemd-tmpfiles[1602]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:51:59.636850 /usr/lib/systemd/system-generators/torcx-generator[1623]: time="2024-07-02T07:51:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:51:59.636889 /usr/lib/systemd/system-generators/torcx-generator[1623]: time="2024-07-02T07:51:59Z" level=info msg="torcx already run" Jul 2 07:51:59.834416 ldconfig[1568]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:51:59.848483 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:51:59.848511 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:51:59.880945 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:52:00.067884 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:52:00.073000 audit: BPF prog-id=27 op=LOAD Jul 2 07:52:00.073000 audit: BPF prog-id=28 op=LOAD Jul 2 07:52:00.073000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:52:00.073000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:52:00.074000 audit: BPF prog-id=29 op=LOAD Jul 2 07:52:00.074000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:52:00.074000 audit: BPF prog-id=30 op=LOAD Jul 2 07:52:00.076000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:52:00.076000 audit: BPF prog-id=31 op=LOAD Jul 2 07:52:00.076000 audit: BPF prog-id=32 op=LOAD Jul 2 07:52:00.076000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:52:00.076000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:52:00.078000 audit: BPF prog-id=33 op=LOAD Jul 2 07:52:00.078000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:52:00.078000 audit: BPF prog-id=34 op=LOAD Jul 2 07:52:00.078000 audit: BPF prog-id=35 op=LOAD Jul 2 07:52:00.078000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:52:00.078000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:52:00.104102 systemd[1]: Finished ldconfig.service. Jul 2 07:52:00.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.107276 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:52:00.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.111250 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:52:00.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.118153 systemd[1]: Starting audit-rules.service... Jul 2 07:52:00.129366 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:52:00.132821 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:52:00.134000 audit: BPF prog-id=36 op=LOAD Jul 2 07:52:00.139000 audit: BPF prog-id=37 op=LOAD Jul 2 07:52:00.137349 systemd[1]: Starting systemd-resolved.service... Jul 2 07:52:00.142077 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:52:00.145628 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:52:00.159776 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:52:00.160197 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.162196 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:52:00.165301 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:52:00.167000 audit[1683]: SYSTEM_BOOT pid=1683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.168392 systemd[1]: Starting modprobe@loop.service... Jul 2 07:52:00.169566 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.169756 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:52:00.169934 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:52:00.171342 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:52:00.171659 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:52:00.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.177872 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:52:00.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.182839 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:52:00.184952 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:52:00.185135 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:52:00.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.189323 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:52:00.189524 systemd[1]: Finished modprobe@loop.service. Jul 2 07:52:00.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.191181 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:52:00.191593 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.193525 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:52:00.198482 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:52:00.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.199719 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.199925 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:52:00.200108 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:52:00.200218 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:52:00.201595 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:52:00.201783 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:52:00.203763 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.208755 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:52:00.208938 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:52:00.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.211693 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:52:00.212166 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.214856 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:52:00.222841 systemd[1]: Starting modprobe@drm.service... Jul 2 07:52:00.225879 systemd[1]: Starting modprobe@loop.service... Jul 2 07:52:00.228283 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.228538 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:52:00.228729 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:52:00.228901 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:52:00.229140 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:52:00.230745 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:52:00.230955 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:52:00.233899 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:52:00.234076 systemd[1]: Finished modprobe@drm.service. Jul 2 07:52:00.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.239535 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:52:00.239713 systemd[1]: Finished modprobe@loop.service. Jul 2 07:52:00.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.244800 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.247623 systemd[1]: Finished ensure-sysext.service. Jul 2 07:52:00.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.282574 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:52:00.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:00.292530 systemd[1]: Starting systemd-update-done.service... Jul 2 07:52:00.300000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:52:00.300000 audit[1705]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc70de6640 a2=420 a3=0 items=0 ppid=1677 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:00.300000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:52:00.301938 augenrules[1705]: No rules Jul 2 07:52:00.302775 systemd[1]: Finished audit-rules.service. Jul 2 07:52:00.311034 systemd[1]: Finished systemd-update-done.service. Jul 2 07:52:00.326998 systemd-networkd[1461]: eth0: Gained IPv6LL Jul 2 07:52:00.334221 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:52:00.365952 systemd-resolved[1681]: Positive Trust Anchors: Jul 2 07:52:00.367235 systemd-resolved[1681]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:52:00.367355 systemd-resolved[1681]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:52:00.404481 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:52:00.407139 systemd[1]: Reached target time-set.target. Jul 2 07:52:00.440017 systemd-resolved[1681]: Defaulting to hostname 'linux'. Jul 2 07:52:00.443699 systemd[1]: Started systemd-resolved.service. Jul 2 07:52:00.446769 systemd[1]: Reached target network.target. Jul 2 07:52:00.450828 systemd[1]: Reached target network-online.target. Jul 2 07:52:00.453041 systemd[1]: Reached target nss-lookup.target. Jul 2 07:52:00.454859 systemd[1]: Reached target sysinit.target. Jul 2 07:52:00.457507 systemd[1]: Started motdgen.path. Jul 2 07:52:00.459602 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:52:00.464123 systemd[1]: Started logrotate.timer. Jul 2 07:52:00.466883 systemd[1]: Started mdadm.timer. Jul 2 07:52:00.473547 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:52:00.476743 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:52:00.476833 systemd[1]: Reached target paths.target. Jul 2 07:52:00.478410 systemd[1]: Reached target timers.target. Jul 2 07:52:00.480229 systemd[1]: Listening on dbus.socket. Jul 2 07:52:00.487424 systemd[1]: Starting docker.socket... Jul 2 07:52:00.501369 systemd[1]: Listening on sshd.socket. Jul 2 07:52:00.505183 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:52:00.508424 systemd[1]: Listening on docker.socket. Jul 2 07:52:00.509958 systemd[1]: Reached target sockets.target. Jul 2 07:52:00.511697 systemd[1]: Reached target basic.target. Jul 2 07:52:00.519347 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.519376 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:52:00.521370 systemd[1]: Started amazon-ssm-agent.service. Jul 2 07:52:00.528552 systemd[1]: Starting containerd.service... Jul 2 07:52:00.533949 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 07:52:00.556849 systemd[1]: Starting dbus.service... Jul 2 07:52:00.564877 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:52:00.576175 systemd[1]: Starting extend-filesystems.service... Jul 2 07:52:00.577742 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:52:00.587103 systemd[1]: Starting kubelet.service... Jul 2 07:52:00.610609 systemd[1]: Starting motdgen.service... Jul 2 07:52:00.617816 systemd[1]: Started nvidia.service. Jul 2 07:52:00.631529 systemd[1]: Starting prepare-helm.service... Jul 2 07:52:00.639928 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:52:00.647186 systemd[1]: Starting sshd-keygen.service... Jul 2 07:52:00.666625 systemd[1]: Starting systemd-logind.service... Jul 2 07:52:00.678424 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:52:00.678604 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:52:00.681729 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:52:00.683668 systemd[1]: Starting update-engine.service... Jul 2 07:52:00.695707 systemd-timesyncd[1682]: Contacted time server 45.61.187.39:123 (0.flatcar.pool.ntp.org). Jul 2 07:52:00.696148 systemd-timesyncd[1682]: Initial clock synchronization to Tue 2024-07-02 07:52:00.676358 UTC. Jul 2 07:52:00.705189 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:52:00.900894 jq[1728]: true Jul 2 07:52:00.852295 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:52:00.904645 jq[1718]: false Jul 2 07:52:00.852663 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:52:00.871044 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:52:00.909041 tar[1730]: linux-amd64/helm Jul 2 07:52:00.871274 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:52:01.014629 dbus-daemon[1717]: [system] SELinux support is enabled Jul 2 07:52:01.015102 systemd[1]: Started dbus.service. Jul 2 07:52:01.020017 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:52:01.020064 systemd[1]: Reached target system-config.target. Jul 2 07:52:01.022210 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:52:01.022238 systemd[1]: Reached target user-config.target. Jul 2 07:52:01.027730 jq[1735]: true Jul 2 07:52:01.033287 dbus-daemon[1717]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1461 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 07:52:01.034947 dbus-daemon[1717]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 07:52:01.043067 systemd[1]: Starting systemd-hostnamed.service... Jul 2 07:52:01.050009 extend-filesystems[1719]: Found loop1 Jul 2 07:52:01.054735 extend-filesystems[1719]: Found nvme0n1 Jul 2 07:52:01.065572 extend-filesystems[1719]: Found nvme0n1p1 Jul 2 07:52:01.072539 extend-filesystems[1719]: Found nvme0n1p2 Jul 2 07:52:01.079135 extend-filesystems[1719]: Found nvme0n1p3 Jul 2 07:52:01.107786 extend-filesystems[1719]: Found usr Jul 2 07:52:01.111391 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:52:01.111645 systemd[1]: Finished motdgen.service. Jul 2 07:52:01.119648 extend-filesystems[1719]: Found nvme0n1p4 Jul 2 07:52:01.130194 extend-filesystems[1719]: Found nvme0n1p6 Jul 2 07:52:01.132406 extend-filesystems[1719]: Found nvme0n1p7 Jul 2 07:52:01.135604 extend-filesystems[1719]: Found nvme0n1p9 Jul 2 07:52:01.135604 extend-filesystems[1719]: Checking size of /dev/nvme0n1p9 Jul 2 07:52:01.155465 amazon-ssm-agent[1714]: 2024/07/02 07:52:01 Failed to load instance info from vault. RegistrationKey does not exist. Jul 2 07:52:01.193810 amazon-ssm-agent[1714]: Initializing new seelog logger Jul 2 07:52:01.209014 update_engine[1727]: I0702 07:52:01.206070 1727 main.cc:92] Flatcar Update Engine starting Jul 2 07:52:01.214510 amazon-ssm-agent[1714]: New Seelog Logger Creation Complete Jul 2 07:52:01.214510 amazon-ssm-agent[1714]: 2024/07/02 07:52:01 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jul 2 07:52:01.214510 amazon-ssm-agent[1714]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jul 2 07:52:01.217808 amazon-ssm-agent[1714]: 2024/07/02 07:52:01 processing appconfig overrides Jul 2 07:52:01.223110 systemd[1]: Started update-engine.service. Jul 2 07:52:01.229372 systemd[1]: Started locksmithd.service. Jul 2 07:52:01.232166 update_engine[1727]: I0702 07:52:01.232133 1727 update_check_scheduler.cc:74] Next update check in 4m48s Jul 2 07:52:01.238585 extend-filesystems[1719]: Resized partition /dev/nvme0n1p9 Jul 2 07:52:01.258109 extend-filesystems[1785]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 07:52:01.261466 bash[1783]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:52:01.264051 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:52:01.292813 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Jul 2 07:52:01.383184 env[1736]: time="2024-07-02T07:52:01.382779869Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:52:01.457463 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Jul 2 07:52:01.486841 extend-filesystems[1785]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Jul 2 07:52:01.486841 extend-filesystems[1785]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 2 07:52:01.486841 extend-filesystems[1785]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Jul 2 07:52:01.513684 extend-filesystems[1719]: Resized filesystem in /dev/nvme0n1p9 Jul 2 07:52:01.490251 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:52:01.490914 systemd[1]: Finished extend-filesystems.service. Jul 2 07:52:01.533328 systemd-logind[1726]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:52:01.533363 systemd-logind[1726]: Watching system buttons on /dev/input/event2 (Sleep Button) Jul 2 07:52:01.533387 systemd-logind[1726]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:52:01.537650 systemd-logind[1726]: New seat seat0. Jul 2 07:52:01.544905 systemd[1]: Started systemd-logind.service. Jul 2 07:52:01.609136 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 07:52:01.619044 env[1736]: time="2024-07-02T07:52:01.617500888Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:52:01.621615 env[1736]: time="2024-07-02T07:52:01.621542248Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:52:01.626595 env[1736]: time="2024-07-02T07:52:01.626534747Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:52:01.626595 env[1736]: time="2024-07-02T07:52:01.626592001Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:52:01.627193 env[1736]: time="2024-07-02T07:52:01.627158249Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:52:01.627268 env[1736]: time="2024-07-02T07:52:01.627195071Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:52:01.627268 env[1736]: time="2024-07-02T07:52:01.627215414Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:52:01.627268 env[1736]: time="2024-07-02T07:52:01.627233985Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:52:01.627390 env[1736]: time="2024-07-02T07:52:01.627359002Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:52:01.627815 env[1736]: time="2024-07-02T07:52:01.627782072Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:52:01.628131 env[1736]: time="2024-07-02T07:52:01.628100365Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:52:01.628196 env[1736]: time="2024-07-02T07:52:01.628133993Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:52:01.628238 env[1736]: time="2024-07-02T07:52:01.628205516Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:52:01.628238 env[1736]: time="2024-07-02T07:52:01.628222559Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:52:01.647799 env[1736]: time="2024-07-02T07:52:01.647733145Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:52:01.648004 env[1736]: time="2024-07-02T07:52:01.647808194Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:52:01.648004 env[1736]: time="2024-07-02T07:52:01.647827872Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:52:01.648004 env[1736]: time="2024-07-02T07:52:01.647964070Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.648004 env[1736]: time="2024-07-02T07:52:01.647987265Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.648187 env[1736]: time="2024-07-02T07:52:01.648033173Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.648187 env[1736]: time="2024-07-02T07:52:01.648142165Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.648265 env[1736]: time="2024-07-02T07:52:01.648188422Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.648265 env[1736]: time="2024-07-02T07:52:01.648211236Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.648265 env[1736]: time="2024-07-02T07:52:01.648231519Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.648549 env[1736]: time="2024-07-02T07:52:01.648267742Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.648549 env[1736]: time="2024-07-02T07:52:01.648289222Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:52:01.648683 env[1736]: time="2024-07-02T07:52:01.648643919Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:52:01.648852 env[1736]: time="2024-07-02T07:52:01.648809854Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:52:01.649393 env[1736]: time="2024-07-02T07:52:01.649352081Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:52:01.649705 env[1736]: time="2024-07-02T07:52:01.649410856Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.649705 env[1736]: time="2024-07-02T07:52:01.649455546Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:52:01.649809 env[1736]: time="2024-07-02T07:52:01.649761382Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.649793298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.649882610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.649901276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.649920093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.649940214Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.649958064Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.649975699Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.649997008Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.650173570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.650195778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.650215473Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.650234045Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.650257220Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:52:01.650972 env[1736]: time="2024-07-02T07:52:01.650275085Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:52:01.651642 env[1736]: time="2024-07-02T07:52:01.650305631Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:52:01.651642 env[1736]: time="2024-07-02T07:52:01.650372763Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:52:01.651717 env[1736]: time="2024-07-02T07:52:01.650681713Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:52:01.651717 env[1736]: time="2024-07-02T07:52:01.650764994Z" level=info msg="Connect containerd service" Jul 2 07:52:01.651717 env[1736]: time="2024-07-02T07:52:01.650826092Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:52:01.657297 env[1736]: time="2024-07-02T07:52:01.651774873Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:52:01.657297 env[1736]: time="2024-07-02T07:52:01.652179001Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:52:01.657297 env[1736]: time="2024-07-02T07:52:01.652238162Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:52:01.657297 env[1736]: time="2024-07-02T07:52:01.652543104Z" level=info msg="containerd successfully booted in 0.344161s" Jul 2 07:52:01.652398 systemd[1]: Started containerd.service. Jul 2 07:52:01.660737 env[1736]: time="2024-07-02T07:52:01.660578771Z" level=info msg="Start subscribing containerd event" Jul 2 07:52:01.660737 env[1736]: time="2024-07-02T07:52:01.660672227Z" level=info msg="Start recovering state" Jul 2 07:52:01.660893 env[1736]: time="2024-07-02T07:52:01.660758219Z" level=info msg="Start event monitor" Jul 2 07:52:01.660893 env[1736]: time="2024-07-02T07:52:01.660782011Z" level=info msg="Start snapshots syncer" Jul 2 07:52:01.660893 env[1736]: time="2024-07-02T07:52:01.660795692Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:52:01.660893 env[1736]: time="2024-07-02T07:52:01.660805749Z" level=info msg="Start streaming server" Jul 2 07:52:01.699059 dbus-daemon[1717]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 07:52:01.699549 systemd[1]: Started systemd-hostnamed.service. Jul 2 07:52:01.703652 dbus-daemon[1717]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1759 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 07:52:01.708868 systemd[1]: Starting polkit.service... Jul 2 07:52:01.767080 polkitd[1820]: Started polkitd version 121 Jul 2 07:52:01.823513 polkitd[1820]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 07:52:01.823607 polkitd[1820]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 07:52:01.829094 polkitd[1820]: Finished loading, compiling and executing 2 rules Jul 2 07:52:01.834146 dbus-daemon[1717]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 07:52:01.834395 systemd[1]: Started polkit.service. Jul 2 07:52:01.839321 polkitd[1820]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 07:52:01.891938 systemd-hostnamed[1759]: Hostname set to (transient) Jul 2 07:52:01.892060 systemd-resolved[1681]: System hostname changed to 'ip-172-31-20-226'. Jul 2 07:52:02.065205 coreos-metadata[1716]: Jul 02 07:52:02.065 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jul 2 07:52:02.080664 coreos-metadata[1716]: Jul 02 07:52:02.080 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Jul 2 07:52:02.085710 coreos-metadata[1716]: Jul 02 07:52:02.085 INFO Fetch successful Jul 2 07:52:02.085710 coreos-metadata[1716]: Jul 02 07:52:02.085 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 2 07:52:02.086524 coreos-metadata[1716]: Jul 02 07:52:02.086 INFO Fetch successful Jul 2 07:52:02.091129 unknown[1716]: wrote ssh authorized keys file for user: core Jul 2 07:52:02.127475 update-ssh-keys[1872]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:52:02.128398 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 07:52:02.248773 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Create new startup processor Jul 2 07:52:02.268020 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [LongRunningPluginsManager] registered plugins: {} Jul 2 07:52:02.268239 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Initializing bookkeeping folders Jul 2 07:52:02.268319 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO removing the completed state files Jul 2 07:52:02.268384 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Initializing bookkeeping folders for long running plugins Jul 2 07:52:02.268485 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Jul 2 07:52:02.268621 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Initializing healthcheck folders for long running plugins Jul 2 07:52:02.268691 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Initializing locations for inventory plugin Jul 2 07:52:02.268793 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Initializing default location for custom inventory Jul 2 07:52:02.268933 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Initializing default location for file inventory Jul 2 07:52:02.269013 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Initializing default location for role inventory Jul 2 07:52:02.269073 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Init the cloudwatchlogs publisher Jul 2 07:52:02.269133 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:softwareInventory Jul 2 07:52:02.269325 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:updateSsmAgent Jul 2 07:52:02.269517 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:configureDocker Jul 2 07:52:02.269698 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:runDockerAction Jul 2 07:52:02.269864 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:configurePackage Jul 2 07:52:02.270108 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:downloadContent Jul 2 07:52:02.273582 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:runDocument Jul 2 07:52:02.273802 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:runPowerShellScript Jul 2 07:52:02.273872 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform independent plugin aws:refreshAssociation Jul 2 07:52:02.273935 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Successfully loaded platform dependent plugin aws:runShellScript Jul 2 07:52:02.273997 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Jul 2 07:52:02.274063 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO OS: linux, Arch: amd64 Jul 2 07:52:02.280690 amazon-ssm-agent[1714]: datastore file /var/lib/amazon/ssm/i-0db71ef2cc4a7d085/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Jul 2 07:52:02.350555 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] Starting session document processing engine... Jul 2 07:52:02.446077 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] [EngineProcessor] Starting Jul 2 07:52:02.540468 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Jul 2 07:52:02.635017 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0db71ef2cc4a7d085, requestId: 3ecaef3c-9078-4ab7-bcfa-b4c3ff767e18 Jul 2 07:52:02.729617 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [OfflineService] Starting document processing engine... Jul 2 07:52:02.825016 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [OfflineService] [EngineProcessor] Starting Jul 2 07:52:02.919975 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [OfflineService] [EngineProcessor] Initial processing Jul 2 07:52:03.015193 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [OfflineService] Starting message polling Jul 2 07:52:03.110660 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [OfflineService] Starting send replies to MDS Jul 2 07:52:03.150422 tar[1730]: linux-amd64/LICENSE Jul 2 07:52:03.151053 tar[1730]: linux-amd64/README.md Jul 2 07:52:03.159166 systemd[1]: Finished prepare-helm.service. Jul 2 07:52:03.206458 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] Starting document processing engine... Jul 2 07:52:03.304158 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] [EngineProcessor] Starting Jul 2 07:52:03.312232 locksmithd[1784]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:52:03.380947 systemd[1]: Started kubelet.service. Jul 2 07:52:03.400306 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Jul 2 07:52:03.496721 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] Starting message polling Jul 2 07:52:03.593474 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] Starting send replies to MDS Jul 2 07:52:03.690397 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [instanceID=i-0db71ef2cc4a7d085] Starting association polling Jul 2 07:52:03.788177 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Jul 2 07:52:03.885799 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] [Association] Launching response handler Jul 2 07:52:03.983882 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Jul 2 07:52:04.081373 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] listening reply. Jul 2 07:52:04.179093 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [HealthCheck] HealthCheck reporting agent health. Jul 2 07:52:04.277573 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Jul 2 07:52:04.376597 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Jul 2 07:52:04.441375 kubelet[1929]: E0702 07:52:04.441311 1929 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:52:04.445022 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:52:04.445151 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:52:04.446059 systemd[1]: kubelet.service: Consumed 1.276s CPU time. Jul 2 07:52:04.474843 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [LongRunningPluginsManager] starting long running plugin manager Jul 2 07:52:04.537257 sshd_keygen[1757]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:52:04.564399 systemd[1]: Finished sshd-keygen.service. Jul 2 07:52:04.567533 systemd[1]: Starting issuegen.service... Jul 2 07:52:04.573532 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Jul 2 07:52:04.575856 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:52:04.576179 systemd[1]: Finished issuegen.service. Jul 2 07:52:04.579578 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:52:04.590951 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:52:04.594769 systemd[1]: Started getty@tty1.service. Jul 2 07:52:04.599569 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:52:04.601166 systemd[1]: Reached target getty.target. Jul 2 07:52:04.602652 systemd[1]: Reached target multi-user.target. Jul 2 07:52:04.606495 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:52:04.618835 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:52:04.619048 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:52:04.620527 systemd[1]: Startup finished in 873ms (kernel) + 7.912s (initrd) + 11.768s (userspace) = 20.555s. Jul 2 07:52:04.672268 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [StartupProcessor] Executing startup processor tasks Jul 2 07:52:04.771264 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Jul 2 07:52:04.870468 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Jul 2 07:52:04.969770 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.5 Jul 2 07:52:05.069194 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Jul 2 07:52:05.168804 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0db71ef2cc4a7d085?role=subscribe&stream=input Jul 2 07:52:05.268670 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0db71ef2cc4a7d085?role=subscribe&stream=input Jul 2 07:52:05.368657 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] Starting receiving message from control channel Jul 2 07:52:05.468864 amazon-ssm-agent[1714]: 2024-07-02 07:52:02 INFO [MessageGatewayService] [EngineProcessor] Initial processing Jul 2 07:52:09.514752 systemd[1]: Created slice system-sshd.slice. Jul 2 07:52:09.516586 systemd[1]: Started sshd@0-172.31.20.226:22-139.178.89.65:60734.service. Jul 2 07:52:09.700832 sshd[1950]: Accepted publickey for core from 139.178.89.65 port 60734 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:52:09.704492 sshd[1950]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:52:09.757488 systemd[1]: Created slice user-500.slice. Jul 2 07:52:09.763912 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:52:09.774525 systemd-logind[1726]: New session 1 of user core. Jul 2 07:52:09.797392 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:52:09.799868 systemd[1]: Starting user@500.service... Jul 2 07:52:09.804743 (systemd)[1953]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:52:09.907660 systemd[1953]: Queued start job for default target default.target. Jul 2 07:52:09.908375 systemd[1953]: Reached target paths.target. Jul 2 07:52:09.908411 systemd[1953]: Reached target sockets.target. Jul 2 07:52:09.908429 systemd[1953]: Reached target timers.target. Jul 2 07:52:09.908463 systemd[1953]: Reached target basic.target. Jul 2 07:52:09.908522 systemd[1953]: Reached target default.target. Jul 2 07:52:09.908562 systemd[1953]: Startup finished in 95ms. Jul 2 07:52:09.909008 systemd[1]: Started user@500.service. Jul 2 07:52:09.910647 systemd[1]: Started session-1.scope. Jul 2 07:52:10.062621 systemd[1]: Started sshd@1-172.31.20.226:22-139.178.89.65:60744.service. Jul 2 07:52:10.243044 sshd[1962]: Accepted publickey for core from 139.178.89.65 port 60744 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:52:10.244661 sshd[1962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:52:10.250656 systemd[1]: Started session-2.scope. Jul 2 07:52:10.251470 systemd-logind[1726]: New session 2 of user core. Jul 2 07:52:10.377603 sshd[1962]: pam_unix(sshd:session): session closed for user core Jul 2 07:52:10.382019 systemd[1]: sshd@1-172.31.20.226:22-139.178.89.65:60744.service: Deactivated successfully. Jul 2 07:52:10.391598 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:52:10.399150 systemd-logind[1726]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:52:10.415130 systemd[1]: Started sshd@2-172.31.20.226:22-139.178.89.65:60748.service. Jul 2 07:52:10.420982 systemd-logind[1726]: Removed session 2. Jul 2 07:52:10.585406 sshd[1968]: Accepted publickey for core from 139.178.89.65 port 60748 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:52:10.589949 sshd[1968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:52:10.597306 systemd-logind[1726]: New session 3 of user core. Jul 2 07:52:10.598043 systemd[1]: Started session-3.scope. Jul 2 07:52:10.716730 sshd[1968]: pam_unix(sshd:session): session closed for user core Jul 2 07:52:10.720049 systemd[1]: sshd@2-172.31.20.226:22-139.178.89.65:60748.service: Deactivated successfully. Jul 2 07:52:10.721145 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:52:10.721901 systemd-logind[1726]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:52:10.722935 systemd-logind[1726]: Removed session 3. Jul 2 07:52:10.743498 systemd[1]: Started sshd@3-172.31.20.226:22-139.178.89.65:60754.service. Jul 2 07:52:10.906682 sshd[1974]: Accepted publickey for core from 139.178.89.65 port 60754 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:52:10.908244 sshd[1974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:52:10.914334 systemd[1]: Started session-4.scope. Jul 2 07:52:10.915190 systemd-logind[1726]: New session 4 of user core. Jul 2 07:52:11.049077 sshd[1974]: pam_unix(sshd:session): session closed for user core Jul 2 07:52:11.053916 systemd[1]: sshd@3-172.31.20.226:22-139.178.89.65:60754.service: Deactivated successfully. Jul 2 07:52:11.055273 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:52:11.055949 systemd-logind[1726]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:52:11.057272 systemd-logind[1726]: Removed session 4. Jul 2 07:52:11.073768 systemd[1]: Started sshd@4-172.31.20.226:22-139.178.89.65:60760.service. Jul 2 07:52:11.229573 sshd[1980]: Accepted publickey for core from 139.178.89.65 port 60760 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:52:11.232082 sshd[1980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:52:11.247539 systemd-logind[1726]: New session 5 of user core. Jul 2 07:52:11.249062 systemd[1]: Started session-5.scope. Jul 2 07:52:11.391513 sudo[1983]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:52:11.392563 sudo[1983]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:52:11.405985 dbus-daemon[1717]: \xd0}\xa09\u0013V: received setenforce notice (enforcing=-697693136) Jul 2 07:52:11.412670 sudo[1983]: pam_unix(sudo:session): session closed for user root Jul 2 07:52:11.439572 sshd[1980]: pam_unix(sshd:session): session closed for user core Jul 2 07:52:11.443667 systemd[1]: sshd@4-172.31.20.226:22-139.178.89.65:60760.service: Deactivated successfully. Jul 2 07:52:11.444961 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:52:11.445694 systemd-logind[1726]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:52:11.446825 systemd-logind[1726]: Removed session 5. Jul 2 07:52:11.465972 systemd[1]: Started sshd@5-172.31.20.226:22-139.178.89.65:60768.service. Jul 2 07:52:11.624074 sshd[1987]: Accepted publickey for core from 139.178.89.65 port 60768 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:52:11.625818 sshd[1987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:52:11.630743 systemd-logind[1726]: New session 6 of user core. Jul 2 07:52:11.631264 systemd[1]: Started session-6.scope. Jul 2 07:52:11.737141 sudo[1991]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:52:11.737481 sudo[1991]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:52:11.741304 sudo[1991]: pam_unix(sudo:session): session closed for user root Jul 2 07:52:11.747891 sudo[1990]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:52:11.748246 sudo[1990]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:52:11.761570 systemd[1]: Stopping audit-rules.service... Jul 2 07:52:11.762000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:52:11.764749 auditctl[1994]: No rules Jul 2 07:52:11.765020 kernel: kauditd_printk_skb: 228 callbacks suppressed Jul 2 07:52:11.765078 kernel: audit: type=1305 audit(1719906731.762:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:52:11.770765 kernel: audit: type=1300 audit(1719906731.762:209): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe6014b030 a2=420 a3=0 items=0 ppid=1 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:11.762000 audit[1994]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe6014b030 a2=420 a3=0 items=0 ppid=1 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:11.766857 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:52:11.767113 systemd[1]: Stopped audit-rules.service. Jul 2 07:52:11.774856 systemd[1]: Starting audit-rules.service... Jul 2 07:52:11.762000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:52:11.782189 kernel: audit: type=1327 audit(1719906731.762:209): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:52:11.782425 kernel: audit: type=1131 audit(1719906731.765:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.810178 augenrules[2011]: No rules Jul 2 07:52:11.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.811012 systemd[1]: Finished audit-rules.service. Jul 2 07:52:11.815723 sudo[1990]: pam_unix(sudo:session): session closed for user root Jul 2 07:52:11.814000 audit[1990]: USER_END pid=1990 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.825050 kernel: audit: type=1130 audit(1719906731.809:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.825200 kernel: audit: type=1106 audit(1719906731.814:212): pid=1990 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.825252 kernel: audit: type=1104 audit(1719906731.814:213): pid=1990 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.814000 audit[1990]: CRED_DISP pid=1990 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.840885 sshd[1987]: pam_unix(sshd:session): session closed for user core Jul 2 07:52:11.840000 audit[1987]: USER_END pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:11.850659 kernel: audit: type=1106 audit(1719906731.840:214): pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:11.850796 kernel: audit: type=1104 audit(1719906731.841:215): pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:11.841000 audit[1987]: CRED_DISP pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:11.846809 systemd[1]: sshd@5-172.31.20.226:22-139.178.89.65:60768.service: Deactivated successfully. Jul 2 07:52:11.847956 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:52:11.851400 systemd-logind[1726]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:52:11.853366 systemd-logind[1726]: Removed session 6. Jul 2 07:52:11.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.20.226:22-139.178.89.65:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.863006 kernel: audit: type=1131 audit(1719906731.841:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.20.226:22-139.178.89.65:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.226:22-139.178.89.65:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:11.867950 systemd[1]: Started sshd@6-172.31.20.226:22-139.178.89.65:60772.service. Jul 2 07:52:12.023000 audit[2017]: USER_ACCT pid=2017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:12.025716 sshd[2017]: Accepted publickey for core from 139.178.89.65 port 60772 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:52:12.025000 audit[2017]: CRED_ACQ pid=2017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:12.025000 audit[2017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6f2fc040 a2=3 a3=0 items=0 ppid=1 pid=2017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.025000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:52:12.027861 sshd[2017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:52:12.033348 systemd[1]: Started session-7.scope. Jul 2 07:52:12.034017 systemd-logind[1726]: New session 7 of user core. Jul 2 07:52:12.038000 audit[2017]: USER_START pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:12.040000 audit[2019]: CRED_ACQ pid=2019 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:12.135000 audit[2020]: USER_ACCT pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:12.137212 sudo[2020]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:52:12.135000 audit[2020]: CRED_REFR pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:12.137730 sudo[2020]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:52:12.138000 audit[2020]: USER_START pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:12.170334 systemd[1]: Starting docker.service... Jul 2 07:52:12.214277 env[2030]: time="2024-07-02T07:52:12.214214219Z" level=info msg="Starting up" Jul 2 07:52:12.215959 env[2030]: time="2024-07-02T07:52:12.215766159Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:52:12.215959 env[2030]: time="2024-07-02T07:52:12.215951749Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:52:12.216125 env[2030]: time="2024-07-02T07:52:12.215983752Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:52:12.216125 env[2030]: time="2024-07-02T07:52:12.215998566Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:52:12.218222 env[2030]: time="2024-07-02T07:52:12.218186330Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:52:12.218222 env[2030]: time="2024-07-02T07:52:12.218208441Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:52:12.218359 env[2030]: time="2024-07-02T07:52:12.218228048Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:52:12.218359 env[2030]: time="2024-07-02T07:52:12.218240166Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:52:12.263205 env[2030]: time="2024-07-02T07:52:12.263127884Z" level=info msg="Loading containers: start." Jul 2 07:52:12.343000 audit[2060]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.343000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff75355f20 a2=0 a3=7fff75355f0c items=0 ppid=2030 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.343000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:52:12.346000 audit[2062]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.346000 audit[2062]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe0df99620 a2=0 a3=7ffe0df9960c items=0 ppid=2030 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:52:12.348000 audit[2064]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.348000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd7b231630 a2=0 a3=7ffd7b23161c items=0 ppid=2030 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:52:12.350000 audit[2066]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.350000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd5f6656a0 a2=0 a3=7ffd5f66568c items=0 ppid=2030 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.350000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:52:12.354000 audit[2068]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.354000 audit[2068]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdae21be80 a2=0 a3=7ffdae21be6c items=0 ppid=2030 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:52:12.376000 audit[2073]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.376000 audit[2073]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef628c590 a2=0 a3=7ffef628c57c items=0 ppid=2030 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:52:12.386000 audit[2075]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.386000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff719f5fb0 a2=0 a3=7fff719f5f9c items=0 ppid=2030 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.386000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:52:12.389000 audit[2077]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.389000 audit[2077]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff77180cf0 a2=0 a3=7fff77180cdc items=0 ppid=2030 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.389000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:52:12.391000 audit[2079]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.391000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffa60568f0 a2=0 a3=7fffa60568dc items=0 ppid=2030 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.391000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:52:12.403000 audit[2083]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.403000 audit[2083]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd2d358400 a2=0 a3=7ffd2d3583ec items=0 ppid=2030 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:52:12.404000 audit[2084]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.404000 audit[2084]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe2f5981a0 a2=0 a3=7ffe2f59818c items=0 ppid=2030 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.404000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:52:12.423470 kernel: Initializing XFRM netlink socket Jul 2 07:52:12.465331 env[2030]: time="2024-07-02T07:52:12.465293219Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:52:12.468390 (udev-worker)[2040]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:52:12.526000 audit[2092]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.526000 audit[2092]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcbeac58a0 a2=0 a3=7ffcbeac588c items=0 ppid=2030 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.526000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:52:12.605000 audit[2095]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2095 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.605000 audit[2095]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcf4c16860 a2=0 a3=7ffcf4c1684c items=0 ppid=2030 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:52:12.609000 audit[2098]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.609000 audit[2098]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff9786a2a0 a2=0 a3=7fff9786a28c items=0 ppid=2030 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:52:12.612000 audit[2100]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.612000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd8de6e010 a2=0 a3=7ffd8de6dffc items=0 ppid=2030 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.612000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:52:12.614000 audit[2102]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.614000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffccce5d450 a2=0 a3=7ffccce5d43c items=0 ppid=2030 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.614000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:52:12.617000 audit[2104]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.617000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffeaaceb160 a2=0 a3=7ffeaaceb14c items=0 ppid=2030 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.617000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:52:12.619000 audit[2106]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.619000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffeb5a1d10 a2=0 a3=7fffeb5a1cfc items=0 ppid=2030 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.619000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:52:12.631000 audit[2109]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.631000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc59dcdd50 a2=0 a3=7ffc59dcdd3c items=0 ppid=2030 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.631000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:52:12.633000 audit[2111]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.633000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc8c7f40a0 a2=0 a3=7ffc8c7f408c items=0 ppid=2030 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.633000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:52:12.636000 audit[2113]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.636000 audit[2113]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc4bd64e30 a2=0 a3=7ffc4bd64e1c items=0 ppid=2030 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.636000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:52:12.639000 audit[2115]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.639000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffda25ad9d0 a2=0 a3=7ffda25ad9bc items=0 ppid=2030 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.639000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:52:12.641204 systemd-networkd[1461]: docker0: Link UP Jul 2 07:52:12.652000 audit[2119]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.652000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe56c902b0 a2=0 a3=7ffe56c9029c items=0 ppid=2030 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:52:12.653000 audit[2120]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:12.653000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd04ee14d0 a2=0 a3=7ffd04ee14bc items=0 ppid=2030 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:12.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:52:12.655721 env[2030]: time="2024-07-02T07:52:12.655683493Z" level=info msg="Loading containers: done." Jul 2 07:52:12.671236 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1296119391-merged.mount: Deactivated successfully. Jul 2 07:52:12.692482 env[2030]: time="2024-07-02T07:52:12.692416536Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:52:12.692741 env[2030]: time="2024-07-02T07:52:12.692672904Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:52:12.692840 env[2030]: time="2024-07-02T07:52:12.692809039Z" level=info msg="Daemon has completed initialization" Jul 2 07:52:12.715592 systemd[1]: Started docker.service. Jul 2 07:52:12.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:12.723130 env[2030]: time="2024-07-02T07:52:12.723064248Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:52:13.755154 env[1736]: time="2024-07-02T07:52:13.753550152Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\"" Jul 2 07:52:14.365294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2387793263.mount: Deactivated successfully. Jul 2 07:52:14.456459 amazon-ssm-agent[1714]: 2024-07-02 07:52:14 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Jul 2 07:52:14.696738 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:52:14.696995 systemd[1]: Stopped kubelet.service. Jul 2 07:52:14.697066 systemd[1]: kubelet.service: Consumed 1.276s CPU time. Jul 2 07:52:14.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:14.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:14.699190 systemd[1]: Starting kubelet.service... Jul 2 07:52:15.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:15.093734 systemd[1]: Started kubelet.service. Jul 2 07:52:15.153180 kubelet[2163]: E0702 07:52:15.153133 2163 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:52:15.157396 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:52:15.157638 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:52:15.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:52:17.288744 env[1736]: time="2024-07-02T07:52:17.288682535Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:17.292072 env[1736]: time="2024-07-02T07:52:17.292024950Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:17.294192 env[1736]: time="2024-07-02T07:52:17.294149874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:17.296711 env[1736]: time="2024-07-02T07:52:17.296669942Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:340ab4a1d66a60630a7a298aa0b2576fcd82e51ecdddb751cf61e5d3846fde2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:17.298894 env[1736]: time="2024-07-02T07:52:17.298844562Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\" returns image reference \"sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe\"" Jul 2 07:52:17.316759 env[1736]: time="2024-07-02T07:52:17.316717416Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\"" Jul 2 07:52:20.540796 env[1736]: time="2024-07-02T07:52:20.540734908Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:20.544417 env[1736]: time="2024-07-02T07:52:20.544368764Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:20.547011 env[1736]: time="2024-07-02T07:52:20.546972114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:20.549398 env[1736]: time="2024-07-02T07:52:20.549356110Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4c412bc1fc585ddeba10d34a02e7507ea787ec2c57256d4c18fd230377ab048e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:20.550311 env[1736]: time="2024-07-02T07:52:20.550267890Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\" returns image reference \"sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974\"" Jul 2 07:52:20.563159 env[1736]: time="2024-07-02T07:52:20.563116452Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\"" Jul 2 07:52:22.564789 env[1736]: time="2024-07-02T07:52:22.564734159Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:22.567554 env[1736]: time="2024-07-02T07:52:22.567513316Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:22.574176 env[1736]: time="2024-07-02T07:52:22.574134798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:22.578997 env[1736]: time="2024-07-02T07:52:22.578950002Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:0ed75a333704f5d315395c6ec04d7af7405715537069b65d40b43ec1c8e030bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:22.579882 env[1736]: time="2024-07-02T07:52:22.579843695Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\" returns image reference \"sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940\"" Jul 2 07:52:22.591632 env[1736]: time="2024-07-02T07:52:22.591593351Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 07:52:23.802113 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1267581871.mount: Deactivated successfully. Jul 2 07:52:24.558607 env[1736]: time="2024-07-02T07:52:24.558555212Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:24.564286 env[1736]: time="2024-07-02T07:52:24.564005693Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:24.566849 env[1736]: time="2024-07-02T07:52:24.566802347Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:24.568613 env[1736]: time="2024-07-02T07:52:24.568572059Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:24.569146 env[1736]: time="2024-07-02T07:52:24.569109816Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772\"" Jul 2 07:52:24.581728 env[1736]: time="2024-07-02T07:52:24.581687632Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 07:52:25.089521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4109639787.mount: Deactivated successfully. Jul 2 07:52:25.172292 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 07:52:25.172608 systemd[1]: Stopped kubelet.service. Jul 2 07:52:25.184028 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 07:52:25.184109 kernel: audit: type=1130 audit(1719906745.172:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:25.184144 kernel: audit: type=1131 audit(1719906745.172:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:25.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:25.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:25.174908 systemd[1]: Starting kubelet.service... Jul 2 07:52:25.543056 systemd[1]: Started kubelet.service. Jul 2 07:52:25.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:25.550482 kernel: audit: type=1130 audit(1719906745.542:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:25.614907 kubelet[2194]: E0702 07:52:25.614862 2194 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:52:25.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:52:25.622001 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:52:25.622169 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:52:25.628640 kernel: audit: type=1131 audit(1719906745.622:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:52:26.617939 env[1736]: time="2024-07-02T07:52:26.617879080Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:26.620807 env[1736]: time="2024-07-02T07:52:26.620747405Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:26.631113 env[1736]: time="2024-07-02T07:52:26.631065050Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:26.634495 env[1736]: time="2024-07-02T07:52:26.634429977Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:26.635328 env[1736]: time="2024-07-02T07:52:26.635288009Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Jul 2 07:52:26.647361 env[1736]: time="2024-07-02T07:52:26.647322988Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 07:52:27.127634 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3668168510.mount: Deactivated successfully. Jul 2 07:52:27.137714 env[1736]: time="2024-07-02T07:52:27.137660771Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:27.140633 env[1736]: time="2024-07-02T07:52:27.140587207Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:27.142715 env[1736]: time="2024-07-02T07:52:27.142675494Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:27.144468 env[1736]: time="2024-07-02T07:52:27.144419740Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:27.144958 env[1736]: time="2024-07-02T07:52:27.144921677Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 07:52:27.156786 env[1736]: time="2024-07-02T07:52:27.156738490Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Jul 2 07:52:27.716241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1925676416.mount: Deactivated successfully. Jul 2 07:52:31.930996 kernel: audit: type=1131 audit(1719906751.923:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:31.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:31.924681 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 07:52:31.947000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:52:31.953799 kernel: audit: type=1334 audit(1719906751.947:260): prog-id=43 op=UNLOAD Jul 2 07:52:31.953923 kernel: audit: type=1334 audit(1719906751.947:261): prog-id=42 op=UNLOAD Jul 2 07:52:31.953957 kernel: audit: type=1334 audit(1719906751.947:262): prog-id=41 op=UNLOAD Jul 2 07:52:31.947000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:52:31.947000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:52:31.971181 env[1736]: time="2024-07-02T07:52:31.971077360Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:31.975102 env[1736]: time="2024-07-02T07:52:31.975053478Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:31.978013 env[1736]: time="2024-07-02T07:52:31.977971257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:31.981463 env[1736]: time="2024-07-02T07:52:31.981391222Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:31.985460 env[1736]: time="2024-07-02T07:52:31.985401109Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Jul 2 07:52:35.234897 systemd[1]: Stopped kubelet.service. Jul 2 07:52:35.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:35.239224 systemd[1]: Starting kubelet.service... Jul 2 07:52:35.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:35.247280 kernel: audit: type=1130 audit(1719906755.234:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:35.247417 kernel: audit: type=1131 audit(1719906755.234:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:35.272319 systemd[1]: Reloading. Jul 2 07:52:35.405468 /usr/lib/systemd/system-generators/torcx-generator[2301]: time="2024-07-02T07:52:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:52:35.406078 /usr/lib/systemd/system-generators/torcx-generator[2301]: time="2024-07-02T07:52:35Z" level=info msg="torcx already run" Jul 2 07:52:35.551651 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:52:35.551677 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:52:35.578720 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:52:35.728356 kernel: audit: type=1400 audit(1719906755.716:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728511 kernel: audit: type=1400 audit(1719906755.716:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.739620 kernel: audit: type=1400 audit(1719906755.723:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.739758 kernel: audit: type=1400 audit(1719906755.723:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit: BPF prog-id=46 op=LOAD Jul 2 07:52:35.728000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit: BPF prog-id=47 op=LOAD Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit: BPF prog-id=48 op=LOAD Jul 2 07:52:35.728000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:52:35.728000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit: BPF prog-id=49 op=LOAD Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit: BPF prog-id=50 op=LOAD Jul 2 07:52:35.733000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:52:35.733000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit: BPF prog-id=51 op=LOAD Jul 2 07:52:35.740000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit: BPF prog-id=52 op=LOAD Jul 2 07:52:35.743000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit: BPF prog-id=53 op=LOAD Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.743000 audit: BPF prog-id=54 op=LOAD Jul 2 07:52:35.743000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:52:35.743000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.745000 audit: BPF prog-id=55 op=LOAD Jul 2 07:52:35.745000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.747000 audit: BPF prog-id=56 op=LOAD Jul 2 07:52:35.747000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit: BPF prog-id=57 op=LOAD Jul 2 07:52:35.748000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit: BPF prog-id=58 op=LOAD Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.748000 audit: BPF prog-id=59 op=LOAD Jul 2 07:52:35.748000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:52:35.748000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:35.750000 audit: BPF prog-id=60 op=LOAD Jul 2 07:52:35.750000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:52:35.783671 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 2 07:52:35.783886 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 2 07:52:35.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:52:35.784172 systemd[1]: Stopped kubelet.service. Jul 2 07:52:35.786731 systemd[1]: Starting kubelet.service... Jul 2 07:52:36.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:36.267264 systemd[1]: Started kubelet.service. Jul 2 07:52:36.355672 kubelet[2356]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:52:36.355672 kubelet[2356]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:52:36.355672 kubelet[2356]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:52:36.356279 kubelet[2356]: I0702 07:52:36.355733 2356 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:52:37.152723 kubelet[2356]: I0702 07:52:37.152682 2356 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 07:52:37.152723 kubelet[2356]: I0702 07:52:37.152714 2356 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:52:37.153175 kubelet[2356]: I0702 07:52:37.153160 2356 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 07:52:37.191557 kubelet[2356]: I0702 07:52:37.191523 2356 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:52:37.192606 kubelet[2356]: E0702 07:52:37.192571 2356 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.20.226:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.207871 kubelet[2356]: I0702 07:52:37.207840 2356 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:52:37.208328 kubelet[2356]: I0702 07:52:37.208289 2356 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:52:37.208564 kubelet[2356]: I0702 07:52:37.208326 2356 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-20-226","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:52:37.209847 kubelet[2356]: I0702 07:52:37.209774 2356 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:52:37.209933 kubelet[2356]: I0702 07:52:37.209855 2356 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:52:37.211095 kubelet[2356]: I0702 07:52:37.211065 2356 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:52:37.212199 kubelet[2356]: I0702 07:52:37.212175 2356 kubelet.go:400] "Attempting to sync node with API server" Jul 2 07:52:37.212294 kubelet[2356]: I0702 07:52:37.212205 2356 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:52:37.212294 kubelet[2356]: I0702 07:52:37.212238 2356 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:52:37.212294 kubelet[2356]: I0702 07:52:37.212255 2356 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:52:37.216933 kubelet[2356]: W0702 07:52:37.216872 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.20.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-20-226&limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.217087 kubelet[2356]: E0702 07:52:37.216951 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.20.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-20-226&limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.220972 kubelet[2356]: W0702 07:52:37.220734 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.20.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.220972 kubelet[2356]: E0702 07:52:37.220800 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.20.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.221165 kubelet[2356]: I0702 07:52:37.221017 2356 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:52:37.226707 kubelet[2356]: I0702 07:52:37.226670 2356 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:52:37.226878 kubelet[2356]: W0702 07:52:37.226754 2356 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:52:37.227774 kubelet[2356]: I0702 07:52:37.227519 2356 server.go:1264] "Started kubelet" Jul 2 07:52:37.245146 kubelet[2356]: I0702 07:52:37.245086 2356 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:52:37.246807 kubelet[2356]: I0702 07:52:37.246746 2356 server.go:455] "Adding debug handlers to kubelet server" Jul 2 07:52:37.249000 audit[2356]: AVC avc: denied { mac_admin } for pid=2356 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:37.250408 kubelet[2356]: I0702 07:52:37.250342 2356 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:52:37.250811 kernel: kauditd_printk_skb: 170 callbacks suppressed Jul 2 07:52:37.250975 kernel: audit: type=1400 audit(1719906757.249:439): avc: denied { mac_admin } for pid=2356 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:37.251026 kubelet[2356]: I0702 07:52:37.250792 2356 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:52:37.258875 kernel: audit: type=1401 audit(1719906757.249:439): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:52:37.249000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:52:37.259044 kubelet[2356]: E0702 07:52:37.258460 2356 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.20.226:6443/api/v1/namespaces/default/events\": dial tcp 172.31.20.226:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-20-226.17de56154f56acee default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-20-226,UID:ip-172-31-20-226,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-20-226,},FirstTimestamp:2024-07-02 07:52:37.227490542 +0000 UTC m=+0.952644480,LastTimestamp:2024-07-02 07:52:37.227490542 +0000 UTC m=+0.952644480,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-20-226,}" Jul 2 07:52:37.259384 kubelet[2356]: I0702 07:52:37.259329 2356 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:52:37.259597 kubelet[2356]: I0702 07:52:37.259560 2356 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:52:37.259832 kubelet[2356]: I0702 07:52:37.259819 2356 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:52:37.249000 audit[2356]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ba8720 a1=c000885de8 a2=c000ba86f0 a3=25 items=0 ppid=1 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.269228 kubelet[2356]: I0702 07:52:37.262732 2356 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:52:37.269228 kubelet[2356]: I0702 07:52:37.262890 2356 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 07:52:37.269228 kubelet[2356]: I0702 07:52:37.262969 2356 reconciler.go:26] "Reconciler: start to sync state" Jul 2 07:52:37.269228 kubelet[2356]: W0702 07:52:37.264117 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.20.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.269228 kubelet[2356]: E0702 07:52:37.264632 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.20.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.269228 kubelet[2356]: E0702 07:52:37.264939 2356 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-226?timeout=10s\": dial tcp 172.31.20.226:6443: connect: connection refused" interval="200ms" Jul 2 07:52:37.269612 kernel: audit: type=1300 audit(1719906757.249:439): arch=c000003e syscall=188 success=no exit=-22 a0=c000ba8720 a1=c000885de8 a2=c000ba86f0 a3=25 items=0 ppid=1 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.249000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:52:37.277424 kubelet[2356]: I0702 07:52:37.272217 2356 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:52:37.277424 kubelet[2356]: I0702 07:52:37.272239 2356 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:52:37.277424 kubelet[2356]: I0702 07:52:37.272327 2356 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:52:37.277722 kernel: audit: type=1327 audit(1719906757.249:439): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:52:37.259000 audit[2356]: AVC avc: denied { mac_admin } for pid=2356 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:37.284525 kernel: audit: type=1400 audit(1719906757.259:440): avc: denied { mac_admin } for pid=2356 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:37.259000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:52:37.287998 kubelet[2356]: E0702 07:52:37.284757 2356 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:52:37.296330 kernel: audit: type=1401 audit(1719906757.259:440): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:52:37.296454 kernel: audit: type=1300 audit(1719906757.259:440): arch=c000003e syscall=188 success=no exit=-22 a0=c000a24980 a1=c000885e00 a2=c000ba87b0 a3=25 items=0 ppid=1 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.259000 audit[2356]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a24980 a1=c000885e00 a2=c000ba87b0 a3=25 items=0 ppid=1 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.259000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:52:37.286000 audit[2366]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.308365 kernel: audit: type=1327 audit(1719906757.259:440): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:52:37.308467 kernel: audit: type=1325 audit(1719906757.286:441): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.286000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5cd33e10 a2=0 a3=7ffd5cd33dfc items=0 ppid=2356 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.318383 kernel: audit: type=1300 audit(1719906757.286:441): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5cd33e10 a2=0 a3=7ffd5cd33dfc items=0 ppid=2356 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:52:37.288000 audit[2367]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.288000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeb98e480 a2=0 a3=7ffeeb98e46c items=0 ppid=2356 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:52:37.292000 audit[2369]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.292000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc318ff6f0 a2=0 a3=7ffc318ff6dc items=0 ppid=2356 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:52:37.295000 audit[2371]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.295000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4f75d950 a2=0 a3=7ffd4f75d93c items=0 ppid=2356 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:52:37.336000 audit[2377]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.336000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd537640f0 a2=0 a3=7ffd537640dc items=0 ppid=2356 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:52:37.339405 kubelet[2356]: I0702 07:52:37.338050 2356 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:52:37.339000 audit[2380]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:52:37.339000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce4c4a9d0 a2=0 a3=7ffce4c4a9bc items=0 ppid=2356 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:52:37.341975 kubelet[2356]: I0702 07:52:37.341950 2356 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:52:37.341000 audit[2381]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.341000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc63496190 a2=0 a3=7ffc6349617c items=0 ppid=2356 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:52:37.342734 kubelet[2356]: I0702 07:52:37.342103 2356 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:52:37.343088 kubelet[2356]: I0702 07:52:37.343075 2356 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 07:52:37.344234 kubelet[2356]: E0702 07:52:37.344206 2356 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:52:37.343000 audit[2382]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.343000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd491121e0 a2=0 a3=7ffd491121cc items=0 ppid=2356 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:52:37.346079 kubelet[2356]: I0702 07:52:37.346050 2356 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:52:37.346079 kubelet[2356]: I0702 07:52:37.346070 2356 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:52:37.346294 kubelet[2356]: I0702 07:52:37.346090 2356 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:52:37.346000 audit[2383]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:52:37.346000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff34411830 a2=0 a3=7fff3441181c items=0 ppid=2356 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:52:37.347739 kubelet[2356]: W0702 07:52:37.347631 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.20.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.348938 kubelet[2356]: E0702 07:52:37.347902 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.20.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:37.349196 kubelet[2356]: I0702 07:52:37.349184 2356 policy_none.go:49] "None policy: Start" Jul 2 07:52:37.349000 audit[2384]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:52:37.349000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebbcbf050 a2=0 a3=7ffebbcbf03c items=0 ppid=2356 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:52:37.350572 kubelet[2356]: I0702 07:52:37.350555 2356 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:52:37.350935 kubelet[2356]: I0702 07:52:37.350746 2356 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:52:37.351000 audit[2385]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:52:37.351000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffeec41f2c0 a2=0 a3=7ffeec41f2ac items=0 ppid=2356 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:52:37.352000 audit[2386]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:52:37.352000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf00f8030 a2=0 a3=7ffdf00f801c items=0 ppid=2356 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:52:37.361656 systemd[1]: Created slice kubepods.slice. Jul 2 07:52:37.367757 kubelet[2356]: I0702 07:52:37.367728 2356 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-20-226" Jul 2 07:52:37.374507 kubelet[2356]: E0702 07:52:37.374461 2356 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.20.226:6443/api/v1/nodes\": dial tcp 172.31.20.226:6443: connect: connection refused" node="ip-172-31-20-226" Jul 2 07:52:37.376021 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:52:37.381027 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:52:37.387489 kubelet[2356]: I0702 07:52:37.387465 2356 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:52:37.387000 audit[2356]: AVC avc: denied { mac_admin } for pid=2356 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:37.387000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:52:37.387000 audit[2356]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ba9b90 a1=c000a39260 a2=c000ba9b60 a3=25 items=0 ppid=1 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:37.387000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:52:37.388512 kubelet[2356]: I0702 07:52:37.388492 2356 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:52:37.389069 kubelet[2356]: I0702 07:52:37.389019 2356 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 07:52:37.392067 kubelet[2356]: E0702 07:52:37.392015 2356 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-20-226\" not found" Jul 2 07:52:37.392578 kubelet[2356]: I0702 07:52:37.392558 2356 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:52:37.445801 kubelet[2356]: I0702 07:52:37.445734 2356 topology_manager.go:215] "Topology Admit Handler" podUID="beed0f620db9e734dded89a287a0a2ad" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-20-226" Jul 2 07:52:37.447285 kubelet[2356]: I0702 07:52:37.447252 2356 topology_manager.go:215] "Topology Admit Handler" podUID="ddaf8350be411e430b3638a8b403de3e" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:37.448800 kubelet[2356]: I0702 07:52:37.448778 2356 topology_manager.go:215] "Topology Admit Handler" podUID="2fca3b580a4aff66094a966d3fb1ee8e" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-20-226" Jul 2 07:52:37.456616 systemd[1]: Created slice kubepods-burstable-podbeed0f620db9e734dded89a287a0a2ad.slice. Jul 2 07:52:37.463877 kubelet[2356]: I0702 07:52:37.463844 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/beed0f620db9e734dded89a287a0a2ad-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-20-226\" (UID: \"beed0f620db9e734dded89a287a0a2ad\") " pod="kube-system/kube-apiserver-ip-172-31-20-226" Jul 2 07:52:37.464227 kubelet[2356]: I0702 07:52:37.464195 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:37.464664 kubelet[2356]: I0702 07:52:37.464238 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-k8s-certs\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:37.464664 kubelet[2356]: I0702 07:52:37.464609 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-kubeconfig\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:37.464664 kubelet[2356]: I0702 07:52:37.464647 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/beed0f620db9e734dded89a287a0a2ad-ca-certs\") pod \"kube-apiserver-ip-172-31-20-226\" (UID: \"beed0f620db9e734dded89a287a0a2ad\") " pod="kube-system/kube-apiserver-ip-172-31-20-226" Jul 2 07:52:37.464825 kubelet[2356]: I0702 07:52:37.464670 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/beed0f620db9e734dded89a287a0a2ad-k8s-certs\") pod \"kube-apiserver-ip-172-31-20-226\" (UID: \"beed0f620db9e734dded89a287a0a2ad\") " pod="kube-system/kube-apiserver-ip-172-31-20-226" Jul 2 07:52:37.464825 kubelet[2356]: I0702 07:52:37.464693 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-ca-certs\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:37.464825 kubelet[2356]: I0702 07:52:37.464717 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:37.464825 kubelet[2356]: I0702 07:52:37.464743 2356 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2fca3b580a4aff66094a966d3fb1ee8e-kubeconfig\") pod \"kube-scheduler-ip-172-31-20-226\" (UID: \"2fca3b580a4aff66094a966d3fb1ee8e\") " pod="kube-system/kube-scheduler-ip-172-31-20-226" Jul 2 07:52:37.465946 kubelet[2356]: E0702 07:52:37.465914 2356 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-226?timeout=10s\": dial tcp 172.31.20.226:6443: connect: connection refused" interval="400ms" Jul 2 07:52:37.472695 systemd[1]: Created slice kubepods-burstable-podddaf8350be411e430b3638a8b403de3e.slice. Jul 2 07:52:37.478374 systemd[1]: Created slice kubepods-burstable-pod2fca3b580a4aff66094a966d3fb1ee8e.slice. Jul 2 07:52:37.576661 kubelet[2356]: I0702 07:52:37.576579 2356 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-20-226" Jul 2 07:52:37.577021 kubelet[2356]: E0702 07:52:37.576978 2356 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.20.226:6443/api/v1/nodes\": dial tcp 172.31.20.226:6443: connect: connection refused" node="ip-172-31-20-226" Jul 2 07:52:37.771479 env[1736]: time="2024-07-02T07:52:37.771327377Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-20-226,Uid:beed0f620db9e734dded89a287a0a2ad,Namespace:kube-system,Attempt:0,}" Jul 2 07:52:37.778782 env[1736]: time="2024-07-02T07:52:37.778728345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-20-226,Uid:ddaf8350be411e430b3638a8b403de3e,Namespace:kube-system,Attempt:0,}" Jul 2 07:52:37.783373 env[1736]: time="2024-07-02T07:52:37.783286104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-20-226,Uid:2fca3b580a4aff66094a966d3fb1ee8e,Namespace:kube-system,Attempt:0,}" Jul 2 07:52:37.867702 kubelet[2356]: E0702 07:52:37.867612 2356 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-226?timeout=10s\": dial tcp 172.31.20.226:6443: connect: connection refused" interval="800ms" Jul 2 07:52:37.978900 kubelet[2356]: I0702 07:52:37.978866 2356 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-20-226" Jul 2 07:52:37.979372 kubelet[2356]: E0702 07:52:37.979329 2356 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.20.226:6443/api/v1/nodes\": dial tcp 172.31.20.226:6443: connect: connection refused" node="ip-172-31-20-226" Jul 2 07:52:38.100783 kubelet[2356]: W0702 07:52:38.100653 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.20.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:38.100783 kubelet[2356]: E0702 07:52:38.100735 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.20.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:38.120429 kubelet[2356]: W0702 07:52:38.120248 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.20.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:38.120429 kubelet[2356]: E0702 07:52:38.120395 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.20.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:38.272210 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1468540957.mount: Deactivated successfully. Jul 2 07:52:38.285993 env[1736]: time="2024-07-02T07:52:38.285736937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.287493 env[1736]: time="2024-07-02T07:52:38.287452505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.296769 env[1736]: time="2024-07-02T07:52:38.296716191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.299926 env[1736]: time="2024-07-02T07:52:38.299789746Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.300908 env[1736]: time="2024-07-02T07:52:38.300869327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.302745 env[1736]: time="2024-07-02T07:52:38.302706287Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.304380 env[1736]: time="2024-07-02T07:52:38.304279264Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.306211 env[1736]: time="2024-07-02T07:52:38.306174625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.307761 env[1736]: time="2024-07-02T07:52:38.307727263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.309575 env[1736]: time="2024-07-02T07:52:38.309539362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.311346 env[1736]: time="2024-07-02T07:52:38.311306752Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.314102 env[1736]: time="2024-07-02T07:52:38.314062576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:52:38.370097 env[1736]: time="2024-07-02T07:52:38.369298455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:52:38.370324 env[1736]: time="2024-07-02T07:52:38.370288166Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:52:38.370573 env[1736]: time="2024-07-02T07:52:38.370543748Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:52:38.374196 env[1736]: time="2024-07-02T07:52:38.370951525Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f54f645e166875324ef2efd3134321d1e0c1952a1282bf590d394fc0d50b4484 pid=2395 runtime=io.containerd.runc.v2 Jul 2 07:52:38.403562 env[1736]: time="2024-07-02T07:52:38.403424081Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:52:38.403562 env[1736]: time="2024-07-02T07:52:38.403505740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:52:38.404377 env[1736]: time="2024-07-02T07:52:38.403784067Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:52:38.404377 env[1736]: time="2024-07-02T07:52:38.404165481Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5aa2ffcd4e01f9ea980b9751ada2dc2e8554c10ceea393a7cf98ec9e93e332a2 pid=2424 runtime=io.containerd.runc.v2 Jul 2 07:52:38.405145 env[1736]: time="2024-07-02T07:52:38.405090382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:52:38.405312 env[1736]: time="2024-07-02T07:52:38.405250468Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:52:38.405556 env[1736]: time="2024-07-02T07:52:38.405522624Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:52:38.406050 env[1736]: time="2024-07-02T07:52:38.406008215Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55d62d91823688302fd75ed15bdadd052747762c287707de5b0255ee47901f03 pid=2419 runtime=io.containerd.runc.v2 Jul 2 07:52:38.416755 systemd[1]: Started cri-containerd-f54f645e166875324ef2efd3134321d1e0c1952a1282bf590d394fc0d50b4484.scope. Jul 2 07:52:38.462380 systemd[1]: Started cri-containerd-55d62d91823688302fd75ed15bdadd052747762c287707de5b0255ee47901f03.scope. Jul 2 07:52:38.463797 systemd[1]: Started cri-containerd-5aa2ffcd4e01f9ea980b9751ada2dc2e8554c10ceea393a7cf98ec9e93e332a2.scope. Jul 2 07:52:38.466569 kubelet[2356]: W0702 07:52:38.466489 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.20.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:38.466569 kubelet[2356]: E0702 07:52:38.466550 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.20.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.468000 audit: BPF prog-id=61 op=LOAD Jul 2 07:52:38.470000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.470000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2395 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346636343565313636383735333234656632656664333133343332 Jul 2 07:52:38.470000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.470000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2395 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346636343565313636383735333234656632656664333133343332 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.471000 audit: BPF prog-id=62 op=LOAD Jul 2 07:52:38.471000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002114a0 items=0 ppid=2395 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346636343565313636383735333234656632656664333133343332 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.473000 audit: BPF prog-id=63 op=LOAD Jul 2 07:52:38.473000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002114e8 items=0 ppid=2395 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346636343565313636383735333234656632656664333133343332 Jul 2 07:52:38.474000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:52:38.474000 audit: BPF prog-id=62 op=UNLOAD Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.474000 audit: BPF prog-id=64 op=LOAD Jul 2 07:52:38.474000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002118f8 items=0 ppid=2395 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346636343565313636383735333234656632656664333133343332 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.508000 audit: BPF prog-id=65 op=LOAD Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2424 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561613266666364346530316639656139383062393735316164613264 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2424 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561613266666364346530316639656139383062393735316164613264 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.509000 audit: BPF prog-id=66 op=LOAD Jul 2 07:52:38.509000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025180 items=0 ppid=2424 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561613266666364346530316639656139383062393735316164613264 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit: BPF prog-id=67 op=LOAD Jul 2 07:52:38.510000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000251c8 items=0 ppid=2424 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561613266666364346530316639656139383062393735316164613264 Jul 2 07:52:38.510000 audit: BPF prog-id=67 op=UNLOAD Jul 2 07:52:38.510000 audit: BPF prog-id=66 op=UNLOAD Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.510000 audit: BPF prog-id=68 op=LOAD Jul 2 07:52:38.510000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000255d8 items=0 ppid=2424 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561613266666364346530316639656139383062393735316164613264 Jul 2 07:52:38.544891 env[1736]: time="2024-07-02T07:52:38.544839850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-20-226,Uid:beed0f620db9e734dded89a287a0a2ad,Namespace:kube-system,Attempt:0,} returns sandbox id \"f54f645e166875324ef2efd3134321d1e0c1952a1282bf590d394fc0d50b4484\"" Jul 2 07:52:38.551317 env[1736]: time="2024-07-02T07:52:38.551270743Z" level=info msg="CreateContainer within sandbox \"f54f645e166875324ef2efd3134321d1e0c1952a1282bf590d394fc0d50b4484\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit: BPF prog-id=69 op=LOAD Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2419 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535643632643931383233363838333032666437356564313562646164 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2419 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535643632643931383233363838333032666437356564313562646164 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.568000 audit: BPF prog-id=70 op=LOAD Jul 2 07:52:38.568000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a8510 items=0 ppid=2419 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535643632643931383233363838333032666437356564313562646164 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit: BPF prog-id=71 op=LOAD Jul 2 07:52:38.569000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a8558 items=0 ppid=2419 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535643632643931383233363838333032666437356564313562646164 Jul 2 07:52:38.569000 audit: BPF prog-id=71 op=UNLOAD Jul 2 07:52:38.569000 audit: BPF prog-id=70 op=UNLOAD Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.569000 audit: BPF prog-id=72 op=LOAD Jul 2 07:52:38.569000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a8968 items=0 ppid=2419 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535643632643931383233363838333032666437356564313562646164 Jul 2 07:52:38.584458 env[1736]: time="2024-07-02T07:52:38.584394207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-20-226,Uid:ddaf8350be411e430b3638a8b403de3e,Namespace:kube-system,Attempt:0,} returns sandbox id \"5aa2ffcd4e01f9ea980b9751ada2dc2e8554c10ceea393a7cf98ec9e93e332a2\"" Jul 2 07:52:38.591493 env[1736]: time="2024-07-02T07:52:38.590542251Z" level=info msg="CreateContainer within sandbox \"5aa2ffcd4e01f9ea980b9751ada2dc2e8554c10ceea393a7cf98ec9e93e332a2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 07:52:38.597467 env[1736]: time="2024-07-02T07:52:38.597338969Z" level=info msg="CreateContainer within sandbox \"f54f645e166875324ef2efd3134321d1e0c1952a1282bf590d394fc0d50b4484\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b17937e3104e2cad578436b520334b68ead287a85fb4422b5d63e8840eb4bcfc\"" Jul 2 07:52:38.598404 env[1736]: time="2024-07-02T07:52:38.598363837Z" level=info msg="StartContainer for \"b17937e3104e2cad578436b520334b68ead287a85fb4422b5d63e8840eb4bcfc\"" Jul 2 07:52:38.640541 systemd[1]: Started cri-containerd-b17937e3104e2cad578436b520334b68ead287a85fb4422b5d63e8840eb4bcfc.scope. Jul 2 07:52:38.653145 env[1736]: time="2024-07-02T07:52:38.653076819Z" level=info msg="CreateContainer within sandbox \"5aa2ffcd4e01f9ea980b9751ada2dc2e8554c10ceea393a7cf98ec9e93e332a2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189\"" Jul 2 07:52:38.654257 env[1736]: time="2024-07-02T07:52:38.654201482Z" level=info msg="StartContainer for \"6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189\"" Jul 2 07:52:38.656199 kubelet[2356]: W0702 07:52:38.655995 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.20.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-20-226&limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:38.656199 kubelet[2356]: E0702 07:52:38.656121 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.20.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-20-226&limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:38.668449 kubelet[2356]: E0702 07:52:38.668321 2356 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-226?timeout=10s\": dial tcp 172.31.20.226:6443: connect: connection refused" interval="1.6s" Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.682000 audit: BPF prog-id=73 op=LOAD Jul 2 07:52:38.684000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.684000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2395 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373933376533313034653263616435373834333662353230333334 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2395 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373933376533313034653263616435373834333662353230333334 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit: BPF prog-id=74 op=LOAD Jul 2 07:52:38.685000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003f2120 items=0 ppid=2395 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373933376533313034653263616435373834333662353230333334 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit: BPF prog-id=75 op=LOAD Jul 2 07:52:38.685000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003f2168 items=0 ppid=2395 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373933376533313034653263616435373834333662353230333334 Jul 2 07:52:38.685000 audit: BPF prog-id=75 op=UNLOAD Jul 2 07:52:38.685000 audit: BPF prog-id=74 op=UNLOAD Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.685000 audit: BPF prog-id=76 op=LOAD Jul 2 07:52:38.685000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f2578 items=0 ppid=2395 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373933376533313034653263616435373834333662353230333334 Jul 2 07:52:38.699055 env[1736]: time="2024-07-02T07:52:38.698991441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-20-226,Uid:2fca3b580a4aff66094a966d3fb1ee8e,Namespace:kube-system,Attempt:0,} returns sandbox id \"55d62d91823688302fd75ed15bdadd052747762c287707de5b0255ee47901f03\"" Jul 2 07:52:38.706913 env[1736]: time="2024-07-02T07:52:38.706863953Z" level=info msg="CreateContainer within sandbox \"55d62d91823688302fd75ed15bdadd052747762c287707de5b0255ee47901f03\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 07:52:38.714354 systemd[1]: Started cri-containerd-6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189.scope. Jul 2 07:52:38.739515 env[1736]: time="2024-07-02T07:52:38.739362953Z" level=info msg="CreateContainer within sandbox \"55d62d91823688302fd75ed15bdadd052747762c287707de5b0255ee47901f03\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934\"" Jul 2 07:52:38.740904 env[1736]: time="2024-07-02T07:52:38.740870019Z" level=info msg="StartContainer for \"2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934\"" Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.759000 audit: BPF prog-id=77 op=LOAD Jul 2 07:52:38.761000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.761000 audit[2546]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2424 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638373830353666623231613530613166626237626638396563386466 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2424 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638373830353666623231613530613166626237626638396563386466 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.762000 audit: BPF prog-id=78 op=LOAD Jul 2 07:52:38.762000 audit[2546]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025240 items=0 ppid=2424 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638373830353666623231613530613166626237626638396563386466 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.764000 audit: BPF prog-id=79 op=LOAD Jul 2 07:52:38.764000 audit[2546]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025288 items=0 ppid=2424 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638373830353666623231613530613166626237626638396563386466 Jul 2 07:52:38.765000 audit: BPF prog-id=79 op=UNLOAD Jul 2 07:52:38.765000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.766000 audit: BPF prog-id=80 op=LOAD Jul 2 07:52:38.766000 audit[2546]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025698 items=0 ppid=2424 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638373830353666623231613530613166626237626638396563386466 Jul 2 07:52:38.780052 env[1736]: time="2024-07-02T07:52:38.779991422Z" level=info msg="StartContainer for \"b17937e3104e2cad578436b520334b68ead287a85fb4422b5d63e8840eb4bcfc\" returns successfully" Jul 2 07:52:38.784500 kubelet[2356]: I0702 07:52:38.783467 2356 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-20-226" Jul 2 07:52:38.784500 kubelet[2356]: E0702 07:52:38.784455 2356 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.20.226:6443/api/v1/nodes\": dial tcp 172.31.20.226:6443: connect: connection refused" node="ip-172-31-20-226" Jul 2 07:52:38.800103 systemd[1]: Started cri-containerd-2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934.scope. Jul 2 07:52:38.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.837000 audit: BPF prog-id=81 op=LOAD Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2419 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237383939373863306333326530393763666461633763333337363033 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2419 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237383939373863306333326530393763666461633763333337363033 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.840000 audit: BPF prog-id=82 op=LOAD Jul 2 07:52:38.840000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028b1f0 items=0 ppid=2419 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237383939373863306333326530393763666461633763333337363033 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit: BPF prog-id=83 op=LOAD Jul 2 07:52:38.841000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028b238 items=0 ppid=2419 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237383939373863306333326530393763666461633763333337363033 Jul 2 07:52:38.841000 audit: BPF prog-id=83 op=UNLOAD Jul 2 07:52:38.841000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:38.841000 audit: BPF prog-id=84 op=LOAD Jul 2 07:52:38.841000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028b648 items=0 ppid=2419 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:38.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237383939373863306333326530393763666461633763333337363033 Jul 2 07:52:38.852627 env[1736]: time="2024-07-02T07:52:38.852575629Z" level=info msg="StartContainer for \"6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189\" returns successfully" Jul 2 07:52:38.910597 env[1736]: time="2024-07-02T07:52:38.910485991Z" level=info msg="StartContainer for \"2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934\" returns successfully" Jul 2 07:52:39.347093 kubelet[2356]: E0702 07:52:39.347048 2356 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.20.226:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:39.712324 kubelet[2356]: W0702 07:52:39.712278 2356 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.20.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:39.712324 kubelet[2356]: E0702 07:52:39.712330 2356 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.20.226:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.20.226:6443: connect: connection refused Jul 2 07:52:40.390008 kubelet[2356]: I0702 07:52:40.389980 2356 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-20-226" Jul 2 07:52:40.636000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:40.636000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00059c540 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:40.636000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:52:40.638000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:40.638000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000571c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:40.638000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:52:42.004000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:42.004000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004296900 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:52:42.004000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:52:42.011000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:42.011000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c0043c0570 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:52:42.011000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:52:42.013000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:42.013000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c0042969f0 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:52:42.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:52:42.015000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:42.015000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c002959da0 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:52:42.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:52:42.016000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:42.016000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c004296d50 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:52:42.016000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:52:42.030000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:42.030000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c0040b7fa0 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:52:42.030000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:52:42.162034 kubelet[2356]: E0702 07:52:42.161979 2356 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-20-226\" not found" node="ip-172-31-20-226" Jul 2 07:52:42.219579 kubelet[2356]: I0702 07:52:42.219531 2356 apiserver.go:52] "Watching apiserver" Jul 2 07:52:42.263159 kubelet[2356]: I0702 07:52:42.263034 2356 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 07:52:42.308942 kubelet[2356]: I0702 07:52:42.308833 2356 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-20-226" Jul 2 07:52:44.257926 systemd[1]: Reloading. Jul 2 07:52:44.405855 /usr/lib/systemd/system-generators/torcx-generator[2652]: time="2024-07-02T07:52:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:52:44.405896 /usr/lib/systemd/system-generators/torcx-generator[2652]: time="2024-07-02T07:52:44Z" level=info msg="torcx already run" Jul 2 07:52:44.482350 amazon-ssm-agent[1714]: 2024-07-02 07:52:44 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Jul 2 07:52:44.571111 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:52:44.571376 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:52:44.597779 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:52:44.732088 kernel: kauditd_printk_skb: 404 callbacks suppressed Jul 2 07:52:44.732249 kernel: audit: type=1400 audit(1719906764.717:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.732296 kernel: audit: type=1400 audit(1719906764.717:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742765 kernel: audit: type=1400 audit(1719906764.720:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.743283 kernel: audit: type=1400 audit(1719906764.720:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.755334 kernel: audit: type=1400 audit(1719906764.720:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.755450 kernel: audit: type=1400 audit(1719906764.720:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.766231 kernel: audit: type=1400 audit(1719906764.720:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.766413 kernel: audit: type=1400 audit(1719906764.720:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.766471 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:52:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773497 kernel: audit: type=1400 audit(1719906764.720:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit: BPF prog-id=85 op=LOAD Jul 2 07:52:44.736000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit: BPF prog-id=86 op=LOAD Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit: BPF prog-id=87 op=LOAD Jul 2 07:52:44.742000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:52:44.742000 audit: BPF prog-id=48 op=UNLOAD Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit: BPF prog-id=88 op=LOAD Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit: BPF prog-id=89 op=LOAD Jul 2 07:52:44.748000 audit: BPF prog-id=49 op=UNLOAD Jul 2 07:52:44.748000 audit: BPF prog-id=50 op=UNLOAD Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.754000 audit: BPF prog-id=90 op=LOAD Jul 2 07:52:44.754000 audit: BPF prog-id=51 op=UNLOAD Jul 2 07:52:44.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit: BPF prog-id=92 op=LOAD Jul 2 07:52:44.773000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit: BPF prog-id=93 op=LOAD Jul 2 07:52:44.774000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.774000 audit: BPF prog-id=95 op=LOAD Jul 2 07:52:44.774000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.776000 audit: BPF prog-id=96 op=LOAD Jul 2 07:52:44.776000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.778000 audit: BPF prog-id=97 op=LOAD Jul 2 07:52:44.778000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit: BPF prog-id=98 op=LOAD Jul 2 07:52:44.780000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit: BPF prog-id=99 op=LOAD Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.780000 audit: BPF prog-id=100 op=LOAD Jul 2 07:52:44.780000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:52:44.780000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.781000 audit: BPF prog-id=101 op=LOAD Jul 2 07:52:44.781000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit: BPF prog-id=102 op=LOAD Jul 2 07:52:44.784000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.784000 audit: BPF prog-id=103 op=LOAD Jul 2 07:52:44.784000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit: BPF prog-id=104 op=LOAD Jul 2 07:52:44.789000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:44.790000 audit: BPF prog-id=105 op=LOAD Jul 2 07:52:44.790000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:52:44.817512 systemd[1]: Stopping kubelet.service... Jul 2 07:52:44.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:44.837189 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:52:44.837462 systemd[1]: Stopped kubelet.service. Jul 2 07:52:44.837541 systemd[1]: kubelet.service: Consumed 1.228s CPU time. Jul 2 07:52:44.844402 systemd[1]: Starting kubelet.service... Jul 2 07:52:46.067879 update_engine[1727]: I0702 07:52:46.067026 1727 update_attempter.cc:509] Updating boot flags... Jul 2 07:52:46.510131 systemd[1]: Started kubelet.service. Jul 2 07:52:46.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:46.801890 kubelet[2812]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:52:46.803183 kubelet[2812]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:52:46.803372 kubelet[2812]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:52:46.822420 kubelet[2812]: I0702 07:52:46.822351 2812 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:52:46.841993 kubelet[2812]: I0702 07:52:46.841963 2812 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 07:52:46.842183 kubelet[2812]: I0702 07:52:46.842169 2812 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:52:46.842654 kubelet[2812]: I0702 07:52:46.842635 2812 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 07:52:46.849872 kubelet[2812]: I0702 07:52:46.849845 2812 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 07:52:46.874325 kubelet[2812]: I0702 07:52:46.874295 2812 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:52:46.884592 kubelet[2812]: I0702 07:52:46.884545 2812 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:52:46.884925 kubelet[2812]: I0702 07:52:46.884884 2812 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:52:46.885156 kubelet[2812]: I0702 07:52:46.884927 2812 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-20-226","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:52:46.885315 kubelet[2812]: I0702 07:52:46.885172 2812 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:52:46.885315 kubelet[2812]: I0702 07:52:46.885204 2812 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:52:46.885315 kubelet[2812]: I0702 07:52:46.885254 2812 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:52:46.886379 kubelet[2812]: I0702 07:52:46.885382 2812 kubelet.go:400] "Attempting to sync node with API server" Jul 2 07:52:46.886379 kubelet[2812]: I0702 07:52:46.885397 2812 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:52:46.886812 kubelet[2812]: I0702 07:52:46.886784 2812 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:52:46.886888 kubelet[2812]: I0702 07:52:46.886816 2812 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:52:46.893578 kubelet[2812]: I0702 07:52:46.890349 2812 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:52:46.893578 kubelet[2812]: I0702 07:52:46.890613 2812 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:52:46.893578 kubelet[2812]: I0702 07:52:46.891374 2812 server.go:1264] "Started kubelet" Jul 2 07:52:46.914462 kubelet[2812]: I0702 07:52:46.914404 2812 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:52:46.914721 kubelet[2812]: I0702 07:52:46.914700 2812 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:52:46.914829 kubelet[2812]: I0702 07:52:46.914820 2812 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:52:46.912000 audit[2812]: AVC avc: denied { mac_admin } for pid=2812 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:46.912000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:52:46.912000 audit[2812]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c97260 a1=c000c873e0 a2=c000c97230 a3=25 items=0 ppid=1 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:46.912000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:52:46.913000 audit[2812]: AVC avc: denied { mac_admin } for pid=2812 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:46.913000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:52:46.913000 audit[2812]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c930a0 a1=c000c873f8 a2=c000c972f0 a3=25 items=0 ppid=1 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:46.913000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:52:46.931367 kubelet[2812]: I0702 07:52:46.931307 2812 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:52:46.932886 kubelet[2812]: I0702 07:52:46.932865 2812 server.go:455] "Adding debug handlers to kubelet server" Jul 2 07:52:46.936144 kubelet[2812]: I0702 07:52:46.936085 2812 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:52:46.936506 kubelet[2812]: I0702 07:52:46.936490 2812 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:52:46.987465 kubelet[2812]: I0702 07:52:46.987408 2812 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 07:52:46.992849 kubelet[2812]: I0702 07:52:46.988839 2812 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:52:46.992849 kubelet[2812]: I0702 07:52:46.989212 2812 reconciler.go:26] "Reconciler: start to sync state" Jul 2 07:52:46.995455 kubelet[2812]: I0702 07:52:46.995389 2812 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:52:46.998844 kubelet[2812]: E0702 07:52:46.997759 2812 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:52:47.000640 kubelet[2812]: I0702 07:52:46.999697 2812 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:52:47.000640 kubelet[2812]: I0702 07:52:46.999717 2812 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:52:47.011235 kubelet[2812]: I0702 07:52:47.010186 2812 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:52:47.011603 kubelet[2812]: I0702 07:52:47.011572 2812 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:52:47.011705 kubelet[2812]: I0702 07:52:47.011609 2812 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:52:47.011705 kubelet[2812]: I0702 07:52:47.011630 2812 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 07:52:47.011705 kubelet[2812]: E0702 07:52:47.011678 2812 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:52:47.095709 kubelet[2812]: I0702 07:52:47.090381 2812 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-20-226" Jul 2 07:52:47.110194 kubelet[2812]: I0702 07:52:47.108159 2812 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-20-226" Jul 2 07:52:47.110194 kubelet[2812]: I0702 07:52:47.108295 2812 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-20-226" Jul 2 07:52:47.113612 kubelet[2812]: E0702 07:52:47.111754 2812 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 07:52:47.151007 kubelet[2812]: I0702 07:52:47.149957 2812 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:52:47.151007 kubelet[2812]: I0702 07:52:47.149977 2812 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:52:47.151007 kubelet[2812]: I0702 07:52:47.150001 2812 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:52:47.151007 kubelet[2812]: I0702 07:52:47.150233 2812 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 07:52:47.151007 kubelet[2812]: I0702 07:52:47.150246 2812 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 07:52:47.151007 kubelet[2812]: I0702 07:52:47.150294 2812 policy_none.go:49] "None policy: Start" Jul 2 07:52:47.151402 kubelet[2812]: I0702 07:52:47.151100 2812 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:52:47.151402 kubelet[2812]: I0702 07:52:47.151121 2812 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:52:47.151524 kubelet[2812]: I0702 07:52:47.151487 2812 state_mem.go:75] "Updated machine memory state" Jul 2 07:52:47.157428 kubelet[2812]: I0702 07:52:47.157389 2812 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:52:47.157672 kubelet[2812]: I0702 07:52:47.157568 2812 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:52:47.155000 audit[2812]: AVC avc: denied { mac_admin } for pid=2812 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:52:47.155000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:52:47.155000 audit[2812]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010a39e0 a1=c000bff050 a2=c0010a39b0 a3=25 items=0 ppid=1 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:47.155000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:52:47.158049 kubelet[2812]: I0702 07:52:47.157798 2812 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 07:52:47.166154 kubelet[2812]: I0702 07:52:47.166117 2812 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:52:47.313358 kubelet[2812]: I0702 07:52:47.313313 2812 topology_manager.go:215] "Topology Admit Handler" podUID="beed0f620db9e734dded89a287a0a2ad" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-20-226" Jul 2 07:52:47.313747 kubelet[2812]: I0702 07:52:47.313728 2812 topology_manager.go:215] "Topology Admit Handler" podUID="ddaf8350be411e430b3638a8b403de3e" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:47.314253 kubelet[2812]: I0702 07:52:47.314235 2812 topology_manager.go:215] "Topology Admit Handler" podUID="2fca3b580a4aff66094a966d3fb1ee8e" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-20-226" Jul 2 07:52:47.391304 kubelet[2812]: I0702 07:52:47.391187 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-kubeconfig\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:47.391546 kubelet[2812]: I0702 07:52:47.391520 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:47.391677 kubelet[2812]: I0702 07:52:47.391662 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2fca3b580a4aff66094a966d3fb1ee8e-kubeconfig\") pod \"kube-scheduler-ip-172-31-20-226\" (UID: \"2fca3b580a4aff66094a966d3fb1ee8e\") " pod="kube-system/kube-scheduler-ip-172-31-20-226" Jul 2 07:52:47.391804 kubelet[2812]: I0702 07:52:47.391789 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/beed0f620db9e734dded89a287a0a2ad-ca-certs\") pod \"kube-apiserver-ip-172-31-20-226\" (UID: \"beed0f620db9e734dded89a287a0a2ad\") " pod="kube-system/kube-apiserver-ip-172-31-20-226" Jul 2 07:52:47.392047 kubelet[2812]: I0702 07:52:47.391933 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/beed0f620db9e734dded89a287a0a2ad-k8s-certs\") pod \"kube-apiserver-ip-172-31-20-226\" (UID: \"beed0f620db9e734dded89a287a0a2ad\") " pod="kube-system/kube-apiserver-ip-172-31-20-226" Jul 2 07:52:47.392130 kubelet[2812]: I0702 07:52:47.392070 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/beed0f620db9e734dded89a287a0a2ad-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-20-226\" (UID: \"beed0f620db9e734dded89a287a0a2ad\") " pod="kube-system/kube-apiserver-ip-172-31-20-226" Jul 2 07:52:47.392130 kubelet[2812]: I0702 07:52:47.392101 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-ca-certs\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:47.392223 kubelet[2812]: I0702 07:52:47.392128 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:47.392223 kubelet[2812]: I0702 07:52:47.392152 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ddaf8350be411e430b3638a8b403de3e-k8s-certs\") pod \"kube-controller-manager-ip-172-31-20-226\" (UID: \"ddaf8350be411e430b3638a8b403de3e\") " pod="kube-system/kube-controller-manager-ip-172-31-20-226" Jul 2 07:52:47.906959 kubelet[2812]: I0702 07:52:47.906927 2812 apiserver.go:52] "Watching apiserver" Jul 2 07:52:47.988693 kubelet[2812]: I0702 07:52:47.988643 2812 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 07:52:48.103201 kubelet[2812]: E0702 07:52:48.103159 2812 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-20-226\" already exists" pod="kube-system/kube-apiserver-ip-172-31-20-226" Jul 2 07:52:48.104485 kubelet[2812]: I0702 07:52:48.104410 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-20-226" podStartSLOduration=1.104356906 podStartE2EDuration="1.104356906s" podCreationTimestamp="2024-07-02 07:52:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:52:48.094166601 +0000 UTC m=+1.545686369" watchObservedRunningTime="2024-07-02 07:52:48.104356906 +0000 UTC m=+1.555876672" Jul 2 07:52:48.141805 kubelet[2812]: I0702 07:52:48.141741 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-20-226" podStartSLOduration=1.141705324 podStartE2EDuration="1.141705324s" podCreationTimestamp="2024-07-02 07:52:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:52:48.125663 +0000 UTC m=+1.577182770" watchObservedRunningTime="2024-07-02 07:52:48.141705324 +0000 UTC m=+1.593225097" Jul 2 07:52:48.194089 kubelet[2812]: I0702 07:52:48.193945 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-20-226" podStartSLOduration=1.193923649 podStartE2EDuration="1.193923649s" podCreationTimestamp="2024-07-02 07:52:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:52:48.142565796 +0000 UTC m=+1.594085565" watchObservedRunningTime="2024-07-02 07:52:48.193923649 +0000 UTC m=+1.645443420" Jul 2 07:52:52.673026 sudo[2020]: pam_unix(sudo:session): session closed for user root Jul 2 07:52:52.672000 audit[2020]: USER_END pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:52.674847 kernel: kauditd_printk_skb: 296 callbacks suppressed Jul 2 07:52:52.674932 kernel: audit: type=1106 audit(1719906772.672:795): pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:52.672000 audit[2020]: CRED_DISP pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:52.685468 kernel: audit: type=1104 audit(1719906772.672:796): pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:52:52.704944 sshd[2017]: pam_unix(sshd:session): session closed for user core Jul 2 07:52:52.706000 audit[2017]: USER_END pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:52.709108 systemd[1]: sshd@6-172.31.20.226:22-139.178.89.65:60772.service: Deactivated successfully. Jul 2 07:52:52.710222 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:52:52.710451 systemd[1]: session-7.scope: Consumed 5.087s CPU time. Jul 2 07:52:52.712917 systemd-logind[1726]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:52:52.706000 audit[2017]: CRED_DISP pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:52.714855 systemd-logind[1726]: Removed session 7. Jul 2 07:52:52.718787 kernel: audit: type=1106 audit(1719906772.706:797): pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:52.718861 kernel: audit: type=1104 audit(1719906772.706:798): pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:52:52.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.226:22-139.178.89.65:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:52.719476 kernel: audit: type=1131 audit(1719906772.706:799): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.226:22-139.178.89.65:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.532000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:56.553423 kernel: audit: type=1400 audit(1719906776.532:800): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:56.553755 kernel: audit: type=1300 audit(1719906776.532:800): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edd1a0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:56.532000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edd1a0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:56.532000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:52:56.564663 kernel: audit: type=1327 audit(1719906776.532:800): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:52:56.564796 kernel: audit: type=1400 audit(1719906776.538:801): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:56.538000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:56.538000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edd360 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:56.583456 kernel: audit: type=1300 audit(1719906776.538:801): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edd360 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:56.538000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:52:56.541000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:56.541000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b07180 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:56.541000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:52:56.541000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:52:56.541000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b071a0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:56.541000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:52:56.902000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:52:56.902000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fb8340 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:52:56.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:00.571266 kubelet[2812]: I0702 07:53:00.571237 2812 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 07:53:00.572281 env[1736]: time="2024-07-02T07:53:00.572239368Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:53:00.572676 kubelet[2812]: I0702 07:53:00.572515 2812 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 07:53:00.871746 kubelet[2812]: I0702 07:53:00.871616 2812 topology_manager.go:215] "Topology Admit Handler" podUID="8ceff569-6457-42e4-ba21-84327bfdee65" podNamespace="kube-system" podName="kube-proxy-cd5bk" Jul 2 07:53:00.881991 systemd[1]: Created slice kubepods-besteffort-pod8ceff569_6457_42e4_ba21_84327bfdee65.slice. Jul 2 07:53:00.902280 kubelet[2812]: I0702 07:53:00.902247 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8ceff569-6457-42e4-ba21-84327bfdee65-lib-modules\") pod \"kube-proxy-cd5bk\" (UID: \"8ceff569-6457-42e4-ba21-84327bfdee65\") " pod="kube-system/kube-proxy-cd5bk" Jul 2 07:53:00.902662 kubelet[2812]: I0702 07:53:00.902595 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8ceff569-6457-42e4-ba21-84327bfdee65-xtables-lock\") pod \"kube-proxy-cd5bk\" (UID: \"8ceff569-6457-42e4-ba21-84327bfdee65\") " pod="kube-system/kube-proxy-cd5bk" Jul 2 07:53:00.902996 kubelet[2812]: I0702 07:53:00.902890 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tf5q7\" (UniqueName: \"kubernetes.io/projected/8ceff569-6457-42e4-ba21-84327bfdee65-kube-api-access-tf5q7\") pod \"kube-proxy-cd5bk\" (UID: \"8ceff569-6457-42e4-ba21-84327bfdee65\") " pod="kube-system/kube-proxy-cd5bk" Jul 2 07:53:00.903316 kubelet[2812]: I0702 07:53:00.903297 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8ceff569-6457-42e4-ba21-84327bfdee65-kube-proxy\") pod \"kube-proxy-cd5bk\" (UID: \"8ceff569-6457-42e4-ba21-84327bfdee65\") " pod="kube-system/kube-proxy-cd5bk" Jul 2 07:53:01.022156 kubelet[2812]: E0702 07:53:01.022107 2812 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Jul 2 07:53:01.022156 kubelet[2812]: E0702 07:53:01.022159 2812 projected.go:200] Error preparing data for projected volume kube-api-access-tf5q7 for pod kube-system/kube-proxy-cd5bk: configmap "kube-root-ca.crt" not found Jul 2 07:53:01.022397 kubelet[2812]: E0702 07:53:01.022250 2812 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/8ceff569-6457-42e4-ba21-84327bfdee65-kube-api-access-tf5q7 podName:8ceff569-6457-42e4-ba21-84327bfdee65 nodeName:}" failed. No retries permitted until 2024-07-02 07:53:01.522222062 +0000 UTC m=+14.973741814 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-tf5q7" (UniqueName: "kubernetes.io/projected/8ceff569-6457-42e4-ba21-84327bfdee65-kube-api-access-tf5q7") pod "kube-proxy-cd5bk" (UID: "8ceff569-6457-42e4-ba21-84327bfdee65") : configmap "kube-root-ca.crt" not found Jul 2 07:53:01.657639 kubelet[2812]: I0702 07:53:01.657597 2812 topology_manager.go:215] "Topology Admit Handler" podUID="3f899c69-41f5-4538-a94d-f6cea994fd73" podNamespace="tigera-operator" podName="tigera-operator-76ff79f7fd-hxxrg" Jul 2 07:53:01.668810 systemd[1]: Created slice kubepods-besteffort-pod3f899c69_41f5_4538_a94d_f6cea994fd73.slice. Jul 2 07:53:01.710735 kubelet[2812]: I0702 07:53:01.710689 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7nh58\" (UniqueName: \"kubernetes.io/projected/3f899c69-41f5-4538-a94d-f6cea994fd73-kube-api-access-7nh58\") pod \"tigera-operator-76ff79f7fd-hxxrg\" (UID: \"3f899c69-41f5-4538-a94d-f6cea994fd73\") " pod="tigera-operator/tigera-operator-76ff79f7fd-hxxrg" Jul 2 07:53:01.710735 kubelet[2812]: I0702 07:53:01.710736 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3f899c69-41f5-4538-a94d-f6cea994fd73-var-lib-calico\") pod \"tigera-operator-76ff79f7fd-hxxrg\" (UID: \"3f899c69-41f5-4538-a94d-f6cea994fd73\") " pod="tigera-operator/tigera-operator-76ff79f7fd-hxxrg" Jul 2 07:53:01.799931 env[1736]: time="2024-07-02T07:53:01.799867012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-cd5bk,Uid:8ceff569-6457-42e4-ba21-84327bfdee65,Namespace:kube-system,Attempt:0,}" Jul 2 07:53:01.858248 env[1736]: time="2024-07-02T07:53:01.857963220Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:01.858248 env[1736]: time="2024-07-02T07:53:01.858027329Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:01.858248 env[1736]: time="2024-07-02T07:53:01.858044942Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:01.859783 env[1736]: time="2024-07-02T07:53:01.859535031Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbd9e8cf0af19f81bbd10515e1a523ea415369de11cd9f7b83d5078ace3614e3 pid=2972 runtime=io.containerd.runc.v2 Jul 2 07:53:01.903258 systemd[1]: Started cri-containerd-cbd9e8cf0af19f81bbd10515e1a523ea415369de11cd9f7b83d5078ace3614e3.scope. Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.944817 kernel: kauditd_printk_skb: 10 callbacks suppressed Jul 2 07:53:01.944942 kernel: audit: type=1400 audit(1719906781.942:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953462 kernel: audit: type=1400 audit(1719906781.942:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.957967 kernel: audit: type=1400 audit(1719906781.942:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.962685 kernel: audit: type=1400 audit(1719906781.942:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.963525 kernel: audit: type=1400 audit(1719906781.942:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.972504 kernel: audit: type=1400 audit(1719906781.942:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.976173 env[1736]: time="2024-07-02T07:53:01.976126965Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-hxxrg,Uid:3f899c69-41f5-4538-a94d-f6cea994fd73,Namespace:tigera-operator,Attempt:0,}" Jul 2 07:53:01.978594 kernel: audit: type=1400 audit(1719906781.942:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.984461 kernel: audit: type=1400 audit(1719906781.942:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.005504 kernel: audit: type=1400 audit(1719906781.942:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.005597 kernel: audit: type=1400 audit(1719906781.942:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit: BPF prog-id=106 op=LOAD Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2972 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:01.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643965386366306166313966383162626431303531356531613532 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2972 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:01.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643965386366306166313966383162626431303531356531613532 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.942000 audit: BPF prog-id=107 op=LOAD Jul 2 07:53:01.942000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000219370 items=0 ppid=2972 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:01.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643965386366306166313966383162626431303531356531613532 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.949000 audit: BPF prog-id=108 op=LOAD Jul 2 07:53:01.949000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002193b8 items=0 ppid=2972 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:01.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643965386366306166313966383162626431303531356531613532 Jul 2 07:53:01.953000 audit: BPF prog-id=108 op=UNLOAD Jul 2 07:53:01.953000 audit: BPF prog-id=107 op=UNLOAD Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:01.953000 audit: BPF prog-id=109 op=LOAD Jul 2 07:53:01.953000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002197c8 items=0 ppid=2972 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:01.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643965386366306166313966383162626431303531356531613532 Jul 2 07:53:02.034301 env[1736]: time="2024-07-02T07:53:02.034253488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-cd5bk,Uid:8ceff569-6457-42e4-ba21-84327bfdee65,Namespace:kube-system,Attempt:0,} returns sandbox id \"cbd9e8cf0af19f81bbd10515e1a523ea415369de11cd9f7b83d5078ace3614e3\"" Jul 2 07:53:02.048251 env[1736]: time="2024-07-02T07:53:02.048198909Z" level=info msg="CreateContainer within sandbox \"cbd9e8cf0af19f81bbd10515e1a523ea415369de11cd9f7b83d5078ace3614e3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:53:02.074037 env[1736]: time="2024-07-02T07:53:02.073934997Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:02.074215 env[1736]: time="2024-07-02T07:53:02.074052111Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:02.074215 env[1736]: time="2024-07-02T07:53:02.074087963Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:02.075138 env[1736]: time="2024-07-02T07:53:02.075064457Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b4131a32628831ee26a0afd28c61b4a469afd604e9bdbfa56555571a7b7d455 pid=3016 runtime=io.containerd.runc.v2 Jul 2 07:53:02.093196 systemd[1]: Started cri-containerd-6b4131a32628831ee26a0afd28c61b4a469afd604e9bdbfa56555571a7b7d455.scope. Jul 2 07:53:02.097824 env[1736]: time="2024-07-02T07:53:02.097770414Z" level=info msg="CreateContainer within sandbox \"cbd9e8cf0af19f81bbd10515e1a523ea415369de11cd9f7b83d5078ace3614e3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d70bc05daf603e51850d9031bbd693df8a2dc29a31f2f5e8b48c189b8adf07da\"" Jul 2 07:53:02.100341 env[1736]: time="2024-07-02T07:53:02.098616143Z" level=info msg="StartContainer for \"d70bc05daf603e51850d9031bbd693df8a2dc29a31f2f5e8b48c189b8adf07da\"" Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.123000 audit: BPF prog-id=110 op=LOAD Jul 2 07:53:02.125000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.125000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343133316133323632383833316565323661306166643238633631 Jul 2 07:53:02.125000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.125000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343133316133323632383833316565323661306166643238633631 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit: BPF prog-id=111 op=LOAD Jul 2 07:53:02.126000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025070 items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343133316133323632383833316565323661306166643238633631 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit: BPF prog-id=112 op=LOAD Jul 2 07:53:02.126000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000250b8 items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343133316133323632383833316565323661306166643238633631 Jul 2 07:53:02.126000 audit: BPF prog-id=112 op=UNLOAD Jul 2 07:53:02.126000 audit: BPF prog-id=111 op=UNLOAD Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.126000 audit: BPF prog-id=113 op=LOAD Jul 2 07:53:02.126000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000254c8 items=0 ppid=3016 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343133316133323632383833316565323661306166643238633631 Jul 2 07:53:02.172461 systemd[1]: Started cri-containerd-d70bc05daf603e51850d9031bbd693df8a2dc29a31f2f5e8b48c189b8adf07da.scope. Jul 2 07:53:02.205409 env[1736]: time="2024-07-02T07:53:02.205167173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-hxxrg,Uid:3f899c69-41f5-4538-a94d-f6cea994fd73,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6b4131a32628831ee26a0afd28c61b4a469afd604e9bdbfa56555571a7b7d455\"" Jul 2 07:53:02.217115 env[1736]: time="2024-07-02T07:53:02.217054087Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 07:53:02.222000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.222000 audit[3049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fbc2431f1c8 items=0 ppid=2972 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306263303564616636303365353138353064393033316262643639 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit: BPF prog-id=114 op=LOAD Jul 2 07:53:02.223000 audit[3049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000452208 items=0 ppid=2972 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306263303564616636303365353138353064393033316262643639 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit: BPF prog-id=115 op=LOAD Jul 2 07:53:02.223000 audit[3049]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000452258 items=0 ppid=2972 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306263303564616636303365353138353064393033316262643639 Jul 2 07:53:02.223000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:53:02.223000 audit: BPF prog-id=114 op=UNLOAD Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:02.223000 audit: BPF prog-id=116 op=LOAD Jul 2 07:53:02.223000 audit[3049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0004522e8 items=0 ppid=2972 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306263303564616636303365353138353064393033316262643639 Jul 2 07:53:02.246073 env[1736]: time="2024-07-02T07:53:02.246009972Z" level=info msg="StartContainer for \"d70bc05daf603e51850d9031bbd693df8a2dc29a31f2f5e8b48c189b8adf07da\" returns successfully" Jul 2 07:53:02.636494 systemd[1]: run-containerd-runc-k8s.io-cbd9e8cf0af19f81bbd10515e1a523ea415369de11cd9f7b83d5078ace3614e3-runc.rahGoo.mount: Deactivated successfully. Jul 2 07:53:02.851000 audit[3107]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.851000 audit[3107]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd52b5f520 a2=0 a3=7ffd52b5f50c items=0 ppid=3061 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:53:02.854000 audit[3108]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=3108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.854000 audit[3108]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf7841200 a2=0 a3=7ffcf78411ec items=0 ppid=3061 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:53:02.855000 audit[3109]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=3109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:02.855000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbb5cd9f0 a2=0 a3=7ffdbb5cd9dc items=0 ppid=3061 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:53:02.857000 audit[3110]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.857000 audit[3111]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:02.857000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5b513ea0 a2=0 a3=7fff5b513e8c items=0 ppid=3061 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:53:02.857000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc004ca730 a2=0 a3=7ffc004ca71c items=0 ppid=3061 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:53:02.860000 audit[3112]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:02.860000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4051f4a0 a2=0 a3=7fff4051f48c items=0 ppid=3061 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:53:02.966000 audit[3113]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.966000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5afad260 a2=0 a3=7ffe5afad24c items=0 ppid=3061 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:53:02.972000 audit[3115]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.972000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe24f3d010 a2=0 a3=7ffe24f3cffc items=0 ppid=3061 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:53:02.979000 audit[3118]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.979000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd905386a0 a2=0 a3=7ffd9053868c items=0 ppid=3061 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:53:02.980000 audit[3119]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.980000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6d308750 a2=0 a3=7fff6d30873c items=0 ppid=3061 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:53:02.985000 audit[3121]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.985000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd4bd19e0 a2=0 a3=7fffd4bd19cc items=0 ppid=3061 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:53:02.986000 audit[3122]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.986000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffda141240 a2=0 a3=7fffda14122c items=0 ppid=3061 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:53:02.994000 audit[3124]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:02.994000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea0744df0 a2=0 a3=7ffea0744ddc items=0 ppid=3061 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:53:03.002000 audit[3127]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.002000 audit[3127]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca2ccb010 a2=0 a3=7ffca2ccaffc items=0 ppid=3061 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:53:03.005000 audit[3128]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.005000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc5f06220 a2=0 a3=7fffc5f0620c items=0 ppid=3061 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:53:03.010000 audit[3130]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.010000 audit[3130]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdf7fb6b0 a2=0 a3=7fffdf7fb69c items=0 ppid=3061 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:53:03.012000 audit[3131]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.012000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0af40d90 a2=0 a3=7fff0af40d7c items=0 ppid=3061 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:53:03.019000 audit[3133]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.019000 audit[3133]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd08b5dca0 a2=0 a3=7ffd08b5dc8c items=0 ppid=3061 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:53:03.025000 audit[3136]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.025000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd77456ed0 a2=0 a3=7ffd77456ebc items=0 ppid=3061 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:53:03.031000 audit[3139]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.031000 audit[3139]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff59d63900 a2=0 a3=7fff59d638ec items=0 ppid=3061 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:53:03.033000 audit[3140]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.033000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0684ecb0 a2=0 a3=7ffc0684ec9c items=0 ppid=3061 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:53:03.040000 audit[3142]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.040000 audit[3142]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd7e3951c0 a2=0 a3=7ffd7e3951ac items=0 ppid=3061 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:53:03.046000 audit[3145]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.046000 audit[3145]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd72440c60 a2=0 a3=7ffd72440c4c items=0 ppid=3061 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:53:03.048000 audit[3146]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.048000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5a1e3290 a2=0 a3=7fff5a1e327c items=0 ppid=3061 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:53:03.051000 audit[3148]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:03.051000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd708409d0 a2=0 a3=7ffd708409bc items=0 ppid=3061 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:53:03.082000 audit[3154]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:03.082000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc3bbc71f0 a2=0 a3=7ffc3bbc71dc items=0 ppid=3061 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:03.089000 audit[3154]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:03.089000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc3bbc71f0 a2=0 a3=7ffc3bbc71dc items=0 ppid=3061 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:03.092000 audit[3159]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.092000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff51d8d650 a2=0 a3=7fff51d8d63c items=0 ppid=3061 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:53:03.100000 audit[3161]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.100000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe46d39e40 a2=0 a3=7ffe46d39e2c items=0 ppid=3061 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:53:03.112000 audit[3164]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.112000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc2f70190 a2=0 a3=7ffcc2f7017c items=0 ppid=3061 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:53:03.118000 audit[3165]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.118000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf0806130 a2=0 a3=7ffdf080611c items=0 ppid=3061 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:53:03.125000 audit[3167]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.125000 audit[3167]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff72781360 a2=0 a3=7fff7278134c items=0 ppid=3061 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:53:03.127000 audit[3168]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.127000 audit[3168]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc39a9840 a2=0 a3=7ffdc39a982c items=0 ppid=3061 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:53:03.131000 audit[3170]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.131000 audit[3170]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff7e2baf30 a2=0 a3=7fff7e2baf1c items=0 ppid=3061 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:53:03.136000 audit[3173]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.136000 audit[3173]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcf3581a50 a2=0 a3=7ffcf3581a3c items=0 ppid=3061 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:53:03.138000 audit[3174]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.138000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffc1fa100 a2=0 a3=7ffffc1fa0ec items=0 ppid=3061 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:53:03.142000 audit[3176]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.142000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcad88fc90 a2=0 a3=7ffcad88fc7c items=0 ppid=3061 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:53:03.144000 audit[3177]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.144000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfddc3460 a2=0 a3=7ffcfddc344c items=0 ppid=3061 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:53:03.147000 audit[3179]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.147000 audit[3179]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1f15b040 a2=0 a3=7ffd1f15b02c items=0 ppid=3061 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:53:03.153000 audit[3182]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.153000 audit[3182]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2b74c730 a2=0 a3=7ffd2b74c71c items=0 ppid=3061 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:53:03.159000 audit[3185]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.159000 audit[3185]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb4e8e4d0 a2=0 a3=7ffdb4e8e4bc items=0 ppid=3061 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:53:03.160000 audit[3186]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.160000 audit[3186]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd8c95c7a0 a2=0 a3=7ffd8c95c78c items=0 ppid=3061 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:53:03.164000 audit[3188]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.164000 audit[3188]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffefdc7c370 a2=0 a3=7ffefdc7c35c items=0 ppid=3061 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.164000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:53:03.169000 audit[3191]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.169000 audit[3191]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc63bfcdb0 a2=0 a3=7ffc63bfcd9c items=0 ppid=3061 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:53:03.171000 audit[3192]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.171000 audit[3192]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd78af39a0 a2=0 a3=7ffd78af398c items=0 ppid=3061 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:53:03.174000 audit[3194]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.174000 audit[3194]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe190e8cd0 a2=0 a3=7ffe190e8cbc items=0 ppid=3061 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:53:03.176000 audit[3195]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.176000 audit[3195]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd021763e0 a2=0 a3=7ffd021763cc items=0 ppid=3061 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:53:03.179000 audit[3197]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.179000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff755e5d50 a2=0 a3=7fff755e5d3c items=0 ppid=3061 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:53:03.184000 audit[3200]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:03.184000 audit[3200]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea6c9a230 a2=0 a3=7ffea6c9a21c items=0 ppid=3061 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:53:03.189000 audit[3202]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:53:03.189000 audit[3202]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffec39e0e00 a2=0 a3=7ffec39e0dec items=0 ppid=3061 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.189000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:03.189000 audit[3202]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:53:03.189000 audit[3202]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffec39e0e00 a2=0 a3=7ffec39e0dec items=0 ppid=3061 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.189000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:03.699543 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2388534156.mount: Deactivated successfully. Jul 2 07:53:04.670999 env[1736]: time="2024-07-02T07:53:04.670950306Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:04.675258 env[1736]: time="2024-07-02T07:53:04.675213432Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:04.682666 env[1736]: time="2024-07-02T07:53:04.682619698Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:04.685106 env[1736]: time="2024-07-02T07:53:04.685058457Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:04.685852 env[1736]: time="2024-07-02T07:53:04.685810963Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 07:53:04.695952 env[1736]: time="2024-07-02T07:53:04.695899273Z" level=info msg="CreateContainer within sandbox \"6b4131a32628831ee26a0afd28c61b4a469afd604e9bdbfa56555571a7b7d455\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 07:53:04.721364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4080567084.mount: Deactivated successfully. Jul 2 07:53:04.738935 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2175624963.mount: Deactivated successfully. Jul 2 07:53:04.749378 env[1736]: time="2024-07-02T07:53:04.749311142Z" level=info msg="CreateContainer within sandbox \"6b4131a32628831ee26a0afd28c61b4a469afd604e9bdbfa56555571a7b7d455\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520\"" Jul 2 07:53:04.751804 env[1736]: time="2024-07-02T07:53:04.751040802Z" level=info msg="StartContainer for \"dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520\"" Jul 2 07:53:04.783211 systemd[1]: Started cri-containerd-dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520.scope. Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.817000 audit: BPF prog-id=117 op=LOAD Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3016 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:04.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343434353935343865623538343630306362383237346663366135 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3016 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:04.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343434353935343865623538343630306362383237346663366135 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit: BPF prog-id=118 op=LOAD Jul 2 07:53:04.818000 audit[3211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216370 items=0 ppid=3016 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:04.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343434353935343865623538343630306362383237346663366135 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit: BPF prog-id=119 op=LOAD Jul 2 07:53:04.818000 audit[3211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002163b8 items=0 ppid=3016 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:04.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343434353935343865623538343630306362383237346663366135 Jul 2 07:53:04.818000 audit: BPF prog-id=119 op=UNLOAD Jul 2 07:53:04.818000 audit: BPF prog-id=118 op=UNLOAD Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { perfmon } for pid=3211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit[3211]: AVC avc: denied { bpf } for pid=3211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:04.818000 audit: BPF prog-id=120 op=LOAD Jul 2 07:53:04.818000 audit[3211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002167c8 items=0 ppid=3016 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:04.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343434353935343865623538343630306362383237346663366135 Jul 2 07:53:04.840570 env[1736]: time="2024-07-02T07:53:04.840471211Z" level=info msg="StartContainer for \"dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520\" returns successfully" Jul 2 07:53:05.134803 kubelet[2812]: I0702 07:53:05.134737 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-cd5bk" podStartSLOduration=5.134714276 podStartE2EDuration="5.134714276s" podCreationTimestamp="2024-07-02 07:53:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:53:03.117154945 +0000 UTC m=+16.568674716" watchObservedRunningTime="2024-07-02 07:53:05.134714276 +0000 UTC m=+18.586234053" Jul 2 07:53:07.985000 audit[3245]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:07.987731 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 2 07:53:07.987873 kernel: audit: type=1325 audit(1719906787.985:916): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:07.985000 audit[3245]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdfcd25990 a2=0 a3=7ffdfcd2597c items=0 ppid=3061 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.003156 kernel: audit: type=1300 audit(1719906787.985:916): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdfcd25990 a2=0 a3=7ffdfcd2597c items=0 ppid=3061 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:07.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:08.007466 kernel: audit: type=1327 audit(1719906787.985:916): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:07.986000 audit[3245]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:08.012351 kernel: audit: type=1325 audit(1719906787.986:917): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:08.012482 kernel: audit: type=1300 audit(1719906787.986:917): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdfcd25990 a2=0 a3=0 items=0 ppid=3061 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:07.986000 audit[3245]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdfcd25990 a2=0 a3=0 items=0 ppid=3061 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:07.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:08.026321 kernel: audit: type=1327 audit(1719906787.986:917): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:08.017000 audit[3247]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:08.017000 audit[3247]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca8ff5ce0 a2=0 a3=7ffca8ff5ccc items=0 ppid=3061 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.040929 kernel: audit: type=1325 audit(1719906788.017:918): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:08.041092 kernel: audit: type=1300 audit(1719906788.017:918): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca8ff5ce0 a2=0 a3=7ffca8ff5ccc items=0 ppid=3061 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.041148 kernel: audit: type=1327 audit(1719906788.017:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:08.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:08.029000 audit[3247]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:08.048485 kernel: audit: type=1325 audit(1719906788.029:919): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:08.029000 audit[3247]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca8ff5ce0 a2=0 a3=0 items=0 ppid=3061 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:08.150843 kubelet[2812]: I0702 07:53:08.150785 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76ff79f7fd-hxxrg" podStartSLOduration=4.676648424 podStartE2EDuration="7.150768832s" podCreationTimestamp="2024-07-02 07:53:01 +0000 UTC" firstStartedPulling="2024-07-02 07:53:02.213715692 +0000 UTC m=+15.665235460" lastFinishedPulling="2024-07-02 07:53:04.687836108 +0000 UTC m=+18.139355868" observedRunningTime="2024-07-02 07:53:05.136240602 +0000 UTC m=+18.587760374" watchObservedRunningTime="2024-07-02 07:53:08.150768832 +0000 UTC m=+21.602288602" Jul 2 07:53:08.157163 kubelet[2812]: I0702 07:53:08.157115 2812 topology_manager.go:215] "Topology Admit Handler" podUID="02409cfe-68d0-4957-be09-8f432718fa4d" podNamespace="calico-system" podName="calico-typha-54994d5cb5-j2fz9" Jul 2 07:53:08.167545 systemd[1]: Created slice kubepods-besteffort-pod02409cfe_68d0_4957_be09_8f432718fa4d.slice. Jul 2 07:53:08.253079 kubelet[2812]: I0702 07:53:08.252808 2812 topology_manager.go:215] "Topology Admit Handler" podUID="d2246965-fd78-40da-ad4a-f61e249c5c02" podNamespace="calico-system" podName="calico-node-wwwlk" Jul 2 07:53:08.263024 systemd[1]: Created slice kubepods-besteffort-podd2246965_fd78_40da_ad4a_f61e249c5c02.slice. Jul 2 07:53:08.280260 kubelet[2812]: I0702 07:53:08.280190 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-cni-bin-dir\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.280560 kubelet[2812]: I0702 07:53:08.280535 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zh9p4\" (UniqueName: \"kubernetes.io/projected/02409cfe-68d0-4957-be09-8f432718fa4d-kube-api-access-zh9p4\") pod \"calico-typha-54994d5cb5-j2fz9\" (UID: \"02409cfe-68d0-4957-be09-8f432718fa4d\") " pod="calico-system/calico-typha-54994d5cb5-j2fz9" Jul 2 07:53:08.280734 kubelet[2812]: I0702 07:53:08.280718 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-flexvol-driver-host\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.281091 kubelet[2812]: I0702 07:53:08.281067 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/02409cfe-68d0-4957-be09-8f432718fa4d-typha-certs\") pod \"calico-typha-54994d5cb5-j2fz9\" (UID: \"02409cfe-68d0-4957-be09-8f432718fa4d\") " pod="calico-system/calico-typha-54994d5cb5-j2fz9" Jul 2 07:53:08.281260 kubelet[2812]: I0702 07:53:08.281244 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/02409cfe-68d0-4957-be09-8f432718fa4d-tigera-ca-bundle\") pod \"calico-typha-54994d5cb5-j2fz9\" (UID: \"02409cfe-68d0-4957-be09-8f432718fa4d\") " pod="calico-system/calico-typha-54994d5cb5-j2fz9" Jul 2 07:53:08.281532 kubelet[2812]: I0702 07:53:08.281511 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-xtables-lock\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.281679 kubelet[2812]: I0702 07:53:08.281665 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-var-lib-calico\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.281813 kubelet[2812]: I0702 07:53:08.281798 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sjk8c\" (UniqueName: \"kubernetes.io/projected/d2246965-fd78-40da-ad4a-f61e249c5c02-kube-api-access-sjk8c\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.282415 kubelet[2812]: I0702 07:53:08.282242 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-lib-modules\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.282879 kubelet[2812]: I0702 07:53:08.282861 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-policysync\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.283054 kubelet[2812]: I0702 07:53:08.283022 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2246965-fd78-40da-ad4a-f61e249c5c02-tigera-ca-bundle\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.283225 kubelet[2812]: I0702 07:53:08.283194 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d2246965-fd78-40da-ad4a-f61e249c5c02-node-certs\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.283629 kubelet[2812]: I0702 07:53:08.283594 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-var-run-calico\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.283753 kubelet[2812]: I0702 07:53:08.283740 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-cni-net-dir\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.283891 kubelet[2812]: I0702 07:53:08.283878 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d2246965-fd78-40da-ad4a-f61e249c5c02-cni-log-dir\") pod \"calico-node-wwwlk\" (UID: \"d2246965-fd78-40da-ad4a-f61e249c5c02\") " pod="calico-system/calico-node-wwwlk" Jul 2 07:53:08.386519 kubelet[2812]: E0702 07:53:08.386483 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.386519 kubelet[2812]: W0702 07:53:08.386509 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.386519 kubelet[2812]: E0702 07:53:08.386535 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.388691 kubelet[2812]: E0702 07:53:08.388663 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.388691 kubelet[2812]: W0702 07:53:08.388688 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.393779 kubelet[2812]: E0702 07:53:08.388709 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.398868 kubelet[2812]: E0702 07:53:08.398830 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.398868 kubelet[2812]: W0702 07:53:08.398863 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.399081 kubelet[2812]: E0702 07:53:08.398891 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.432651 kubelet[2812]: I0702 07:53:08.422372 2812 topology_manager.go:215] "Topology Admit Handler" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" podNamespace="calico-system" podName="csi-node-driver-xkmmj" Jul 2 07:53:08.432651 kubelet[2812]: E0702 07:53:08.422831 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkmmj" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" Jul 2 07:53:08.432651 kubelet[2812]: E0702 07:53:08.426007 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.432651 kubelet[2812]: W0702 07:53:08.426026 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.432651 kubelet[2812]: E0702 07:53:08.426057 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.432651 kubelet[2812]: E0702 07:53:08.430709 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.432651 kubelet[2812]: W0702 07:53:08.430731 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.432651 kubelet[2812]: E0702 07:53:08.430761 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.432651 kubelet[2812]: E0702 07:53:08.431081 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.433307 kubelet[2812]: W0702 07:53:08.431092 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.433307 kubelet[2812]: E0702 07:53:08.431111 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.433307 kubelet[2812]: E0702 07:53:08.431563 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.433307 kubelet[2812]: W0702 07:53:08.431574 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.433307 kubelet[2812]: E0702 07:53:08.431658 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.433307 kubelet[2812]: E0702 07:53:08.432064 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.433307 kubelet[2812]: W0702 07:53:08.432074 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.433307 kubelet[2812]: E0702 07:53:08.432180 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.433307 kubelet[2812]: E0702 07:53:08.432347 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.433307 kubelet[2812]: W0702 07:53:08.432356 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.434965 kubelet[2812]: E0702 07:53:08.432478 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.434965 kubelet[2812]: E0702 07:53:08.432651 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.434965 kubelet[2812]: W0702 07:53:08.432659 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.434965 kubelet[2812]: E0702 07:53:08.432745 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.434965 kubelet[2812]: E0702 07:53:08.432905 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.434965 kubelet[2812]: W0702 07:53:08.432914 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.434965 kubelet[2812]: E0702 07:53:08.432955 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.434965 kubelet[2812]: E0702 07:53:08.433300 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.434965 kubelet[2812]: W0702 07:53:08.433311 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.434965 kubelet[2812]: E0702 07:53:08.433394 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.435400 kubelet[2812]: E0702 07:53:08.433572 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.435400 kubelet[2812]: W0702 07:53:08.433686 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.435400 kubelet[2812]: E0702 07:53:08.433782 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.435400 kubelet[2812]: E0702 07:53:08.434149 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.435400 kubelet[2812]: W0702 07:53:08.434159 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.435400 kubelet[2812]: E0702 07:53:08.434272 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.435400 kubelet[2812]: E0702 07:53:08.434611 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.435400 kubelet[2812]: W0702 07:53:08.434621 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.435400 kubelet[2812]: E0702 07:53:08.434828 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.435400 kubelet[2812]: E0702 07:53:08.435003 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.435985 kubelet[2812]: W0702 07:53:08.435015 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.435985 kubelet[2812]: E0702 07:53:08.435101 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.435985 kubelet[2812]: E0702 07:53:08.435270 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.436967 kubelet[2812]: W0702 07:53:08.436127 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.436967 kubelet[2812]: E0702 07:53:08.436233 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.436967 kubelet[2812]: E0702 07:53:08.436402 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.436967 kubelet[2812]: W0702 07:53:08.436411 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.436967 kubelet[2812]: E0702 07:53:08.436554 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.436967 kubelet[2812]: E0702 07:53:08.436711 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.436967 kubelet[2812]: W0702 07:53:08.436721 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.436967 kubelet[2812]: E0702 07:53:08.436786 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.437466 kubelet[2812]: E0702 07:53:08.437121 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.437466 kubelet[2812]: W0702 07:53:08.437132 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.437466 kubelet[2812]: E0702 07:53:08.437185 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.437609 kubelet[2812]: E0702 07:53:08.437485 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.437609 kubelet[2812]: W0702 07:53:08.437495 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.437609 kubelet[2812]: E0702 07:53:08.437599 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.437847 kubelet[2812]: E0702 07:53:08.437749 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.437847 kubelet[2812]: W0702 07:53:08.437761 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.440529 kubelet[2812]: E0702 07:53:08.439668 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.440529 kubelet[2812]: E0702 07:53:08.440124 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.440529 kubelet[2812]: W0702 07:53:08.440136 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.440529 kubelet[2812]: E0702 07:53:08.440235 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.440529 kubelet[2812]: E0702 07:53:08.440402 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.440529 kubelet[2812]: W0702 07:53:08.440411 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.441384 kubelet[2812]: E0702 07:53:08.440645 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.441384 kubelet[2812]: E0702 07:53:08.440862 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.441384 kubelet[2812]: W0702 07:53:08.440911 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.441384 kubelet[2812]: E0702 07:53:08.441242 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.441654 kubelet[2812]: E0702 07:53:08.441515 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.441654 kubelet[2812]: W0702 07:53:08.441526 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.441654 kubelet[2812]: E0702 07:53:08.441620 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.441804 kubelet[2812]: E0702 07:53:08.441763 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.441804 kubelet[2812]: W0702 07:53:08.441773 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.441895 kubelet[2812]: E0702 07:53:08.441852 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.442461 kubelet[2812]: E0702 07:53:08.442095 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.442461 kubelet[2812]: W0702 07:53:08.442108 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.442461 kubelet[2812]: E0702 07:53:08.442197 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.442461 kubelet[2812]: E0702 07:53:08.442371 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.442461 kubelet[2812]: W0702 07:53:08.442380 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.442816 kubelet[2812]: E0702 07:53:08.442485 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.442816 kubelet[2812]: E0702 07:53:08.442710 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.442816 kubelet[2812]: W0702 07:53:08.442720 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.442816 kubelet[2812]: E0702 07:53:08.442806 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.443128 kubelet[2812]: E0702 07:53:08.443083 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.443128 kubelet[2812]: W0702 07:53:08.443093 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.443225 kubelet[2812]: E0702 07:53:08.443182 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.444464 kubelet[2812]: E0702 07:53:08.443392 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.444464 kubelet[2812]: W0702 07:53:08.443404 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.444464 kubelet[2812]: E0702 07:53:08.443517 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.444464 kubelet[2812]: E0702 07:53:08.443751 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.444464 kubelet[2812]: W0702 07:53:08.443761 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.444464 kubelet[2812]: E0702 07:53:08.443871 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.444464 kubelet[2812]: E0702 07:53:08.444204 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.444464 kubelet[2812]: W0702 07:53:08.444214 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.444464 kubelet[2812]: E0702 07:53:08.444302 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.445052 kubelet[2812]: E0702 07:53:08.444476 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.445052 kubelet[2812]: W0702 07:53:08.444485 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.445052 kubelet[2812]: E0702 07:53:08.444660 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.446463 kubelet[2812]: E0702 07:53:08.445669 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.446463 kubelet[2812]: W0702 07:53:08.445683 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.446463 kubelet[2812]: E0702 07:53:08.445770 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.446463 kubelet[2812]: E0702 07:53:08.446130 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.446463 kubelet[2812]: W0702 07:53:08.446140 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.458458 kubelet[2812]: E0702 07:53:08.450491 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.458458 kubelet[2812]: E0702 07:53:08.454573 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.458458 kubelet[2812]: W0702 07:53:08.454589 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.458458 kubelet[2812]: E0702 07:53:08.454828 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.458458 kubelet[2812]: E0702 07:53:08.455083 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.458458 kubelet[2812]: W0702 07:53:08.455094 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.458458 kubelet[2812]: E0702 07:53:08.455293 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.458458 kubelet[2812]: E0702 07:53:08.455511 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.458458 kubelet[2812]: W0702 07:53:08.455522 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.458458 kubelet[2812]: E0702 07:53:08.455641 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.459075 kubelet[2812]: E0702 07:53:08.455780 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.459075 kubelet[2812]: W0702 07:53:08.455789 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.459075 kubelet[2812]: E0702 07:53:08.455871 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.459075 kubelet[2812]: E0702 07:53:08.456005 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.459075 kubelet[2812]: W0702 07:53:08.456014 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.459075 kubelet[2812]: E0702 07:53:08.456095 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.459075 kubelet[2812]: E0702 07:53:08.456220 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.459075 kubelet[2812]: W0702 07:53:08.456228 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.459075 kubelet[2812]: E0702 07:53:08.456312 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.459075 kubelet[2812]: E0702 07:53:08.456459 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.459576 kubelet[2812]: W0702 07:53:08.456468 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.459576 kubelet[2812]: E0702 07:53:08.456606 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.459576 kubelet[2812]: E0702 07:53:08.456751 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.459576 kubelet[2812]: W0702 07:53:08.456761 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.459576 kubelet[2812]: E0702 07:53:08.456772 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.459576 kubelet[2812]: E0702 07:53:08.456947 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.459576 kubelet[2812]: W0702 07:53:08.456955 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.459576 kubelet[2812]: E0702 07:53:08.456965 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.459576 kubelet[2812]: E0702 07:53:08.457129 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.459576 kubelet[2812]: W0702 07:53:08.457137 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460053 kubelet[2812]: E0702 07:53:08.457146 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460053 kubelet[2812]: E0702 07:53:08.457319 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460053 kubelet[2812]: W0702 07:53:08.457327 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460053 kubelet[2812]: E0702 07:53:08.457337 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460053 kubelet[2812]: E0702 07:53:08.457570 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460053 kubelet[2812]: W0702 07:53:08.457581 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460053 kubelet[2812]: E0702 07:53:08.457592 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460053 kubelet[2812]: E0702 07:53:08.457764 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460053 kubelet[2812]: W0702 07:53:08.457772 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460053 kubelet[2812]: E0702 07:53:08.457781 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460541 kubelet[2812]: E0702 07:53:08.457940 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460541 kubelet[2812]: W0702 07:53:08.457948 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460541 kubelet[2812]: E0702 07:53:08.457957 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460541 kubelet[2812]: E0702 07:53:08.458121 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460541 kubelet[2812]: W0702 07:53:08.458128 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460541 kubelet[2812]: E0702 07:53:08.458137 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460541 kubelet[2812]: E0702 07:53:08.458388 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460541 kubelet[2812]: W0702 07:53:08.458398 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460541 kubelet[2812]: E0702 07:53:08.458411 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460541 kubelet[2812]: E0702 07:53:08.458615 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460854 kubelet[2812]: W0702 07:53:08.458624 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460854 kubelet[2812]: E0702 07:53:08.458635 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460854 kubelet[2812]: E0702 07:53:08.458814 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460854 kubelet[2812]: W0702 07:53:08.458823 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460854 kubelet[2812]: E0702 07:53:08.458834 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460854 kubelet[2812]: E0702 07:53:08.459005 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460854 kubelet[2812]: W0702 07:53:08.459014 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.460854 kubelet[2812]: E0702 07:53:08.459024 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.460854 kubelet[2812]: E0702 07:53:08.459204 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.460854 kubelet[2812]: W0702 07:53:08.459212 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.461279 kubelet[2812]: E0702 07:53:08.459223 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.461279 kubelet[2812]: E0702 07:53:08.459388 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.461279 kubelet[2812]: W0702 07:53:08.459395 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.461279 kubelet[2812]: E0702 07:53:08.459406 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.461279 kubelet[2812]: E0702 07:53:08.459597 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.461279 kubelet[2812]: W0702 07:53:08.459606 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.461279 kubelet[2812]: E0702 07:53:08.459618 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.461279 kubelet[2812]: E0702 07:53:08.459792 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.461279 kubelet[2812]: W0702 07:53:08.459801 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.461279 kubelet[2812]: E0702 07:53:08.459812 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.465775 kubelet[2812]: E0702 07:53:08.459995 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.465775 kubelet[2812]: W0702 07:53:08.460003 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.465775 kubelet[2812]: E0702 07:53:08.460013 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.465775 kubelet[2812]: E0702 07:53:08.460185 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.465775 kubelet[2812]: W0702 07:53:08.460194 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.465775 kubelet[2812]: E0702 07:53:08.460204 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.465775 kubelet[2812]: E0702 07:53:08.460373 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.465775 kubelet[2812]: W0702 07:53:08.460380 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.465775 kubelet[2812]: E0702 07:53:08.460394 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.465775 kubelet[2812]: E0702 07:53:08.460585 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.466300 kubelet[2812]: W0702 07:53:08.460594 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.466300 kubelet[2812]: E0702 07:53:08.460606 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.490144 kubelet[2812]: E0702 07:53:08.490114 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.490144 kubelet[2812]: W0702 07:53:08.490135 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.490394 kubelet[2812]: E0702 07:53:08.490162 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.490394 kubelet[2812]: I0702 07:53:08.490192 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b0fe9189-3a75-490d-8563-da840bc1e64a-kubelet-dir\") pod \"csi-node-driver-xkmmj\" (UID: \"b0fe9189-3a75-490d-8563-da840bc1e64a\") " pod="calico-system/csi-node-driver-xkmmj" Jul 2 07:53:08.502838 kubelet[2812]: E0702 07:53:08.499631 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.502838 kubelet[2812]: W0702 07:53:08.499652 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.502838 kubelet[2812]: E0702 07:53:08.499681 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.502838 kubelet[2812]: E0702 07:53:08.500011 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.502838 kubelet[2812]: W0702 07:53:08.500021 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.502838 kubelet[2812]: E0702 07:53:08.500125 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.502838 kubelet[2812]: I0702 07:53:08.500156 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xcc7r\" (UniqueName: \"kubernetes.io/projected/b0fe9189-3a75-490d-8563-da840bc1e64a-kube-api-access-xcc7r\") pod \"csi-node-driver-xkmmj\" (UID: \"b0fe9189-3a75-490d-8563-da840bc1e64a\") " pod="calico-system/csi-node-driver-xkmmj" Jul 2 07:53:08.502838 kubelet[2812]: E0702 07:53:08.500489 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.502838 kubelet[2812]: W0702 07:53:08.500510 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.509490 kubelet[2812]: E0702 07:53:08.500643 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.509490 kubelet[2812]: E0702 07:53:08.500829 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.509490 kubelet[2812]: W0702 07:53:08.500838 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.509490 kubelet[2812]: E0702 07:53:08.500932 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.509490 kubelet[2812]: E0702 07:53:08.501867 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.509490 kubelet[2812]: W0702 07:53:08.501879 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.509490 kubelet[2812]: E0702 07:53:08.501989 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.509490 kubelet[2812]: E0702 07:53:08.502154 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.509490 kubelet[2812]: W0702 07:53:08.502164 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.509490 kubelet[2812]: E0702 07:53:08.505504 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.509988 kubelet[2812]: I0702 07:53:08.505562 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b0fe9189-3a75-490d-8563-da840bc1e64a-varrun\") pod \"csi-node-driver-xkmmj\" (UID: \"b0fe9189-3a75-490d-8563-da840bc1e64a\") " pod="calico-system/csi-node-driver-xkmmj" Jul 2 07:53:08.509988 kubelet[2812]: E0702 07:53:08.505781 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.509988 kubelet[2812]: W0702 07:53:08.505792 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.509988 kubelet[2812]: E0702 07:53:08.505909 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.509988 kubelet[2812]: E0702 07:53:08.506143 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.509988 kubelet[2812]: W0702 07:53:08.506164 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.509988 kubelet[2812]: E0702 07:53:08.506178 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.509988 kubelet[2812]: E0702 07:53:08.506492 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.509988 kubelet[2812]: W0702 07:53:08.506505 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.510413 kubelet[2812]: E0702 07:53:08.506530 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.510413 kubelet[2812]: E0702 07:53:08.506784 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.510413 kubelet[2812]: W0702 07:53:08.506794 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.510413 kubelet[2812]: E0702 07:53:08.506818 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.510413 kubelet[2812]: E0702 07:53:08.507058 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.510413 kubelet[2812]: W0702 07:53:08.507067 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.510413 kubelet[2812]: E0702 07:53:08.507091 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.510413 kubelet[2812]: E0702 07:53:08.507296 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.510413 kubelet[2812]: W0702 07:53:08.507307 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.510413 kubelet[2812]: E0702 07:53:08.507328 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.512973 kubelet[2812]: E0702 07:53:08.510821 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.512973 kubelet[2812]: W0702 07:53:08.510835 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.512973 kubelet[2812]: E0702 07:53:08.510856 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.512973 kubelet[2812]: I0702 07:53:08.510889 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b0fe9189-3a75-490d-8563-da840bc1e64a-socket-dir\") pod \"csi-node-driver-xkmmj\" (UID: \"b0fe9189-3a75-490d-8563-da840bc1e64a\") " pod="calico-system/csi-node-driver-xkmmj" Jul 2 07:53:08.512973 kubelet[2812]: E0702 07:53:08.511250 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.512973 kubelet[2812]: W0702 07:53:08.511266 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.512973 kubelet[2812]: E0702 07:53:08.511284 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.512973 kubelet[2812]: E0702 07:53:08.511563 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.512973 kubelet[2812]: W0702 07:53:08.511573 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.513345 kubelet[2812]: E0702 07:53:08.511590 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.513345 kubelet[2812]: E0702 07:53:08.511857 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.513345 kubelet[2812]: W0702 07:53:08.511868 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.513345 kubelet[2812]: E0702 07:53:08.511954 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.513345 kubelet[2812]: E0702 07:53:08.512383 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.513345 kubelet[2812]: W0702 07:53:08.512403 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.513345 kubelet[2812]: E0702 07:53:08.512419 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.513345 kubelet[2812]: E0702 07:53:08.512734 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.513345 kubelet[2812]: W0702 07:53:08.512745 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.513345 kubelet[2812]: E0702 07:53:08.512761 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.519608 kubelet[2812]: E0702 07:53:08.519567 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.519608 kubelet[2812]: W0702 07:53:08.519591 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.519806 kubelet[2812]: E0702 07:53:08.519762 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.520678 kubelet[2812]: E0702 07:53:08.520549 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.520678 kubelet[2812]: W0702 07:53:08.520567 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.520678 kubelet[2812]: E0702 07:53:08.520635 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.520913 kubelet[2812]: E0702 07:53:08.520888 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.520913 kubelet[2812]: W0702 07:53:08.520899 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.521001 kubelet[2812]: E0702 07:53:08.520930 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.521001 kubelet[2812]: I0702 07:53:08.520967 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b0fe9189-3a75-490d-8563-da840bc1e64a-registration-dir\") pod \"csi-node-driver-xkmmj\" (UID: \"b0fe9189-3a75-490d-8563-da840bc1e64a\") " pod="calico-system/csi-node-driver-xkmmj" Jul 2 07:53:08.521385 kubelet[2812]: E0702 07:53:08.521354 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.521385 kubelet[2812]: W0702 07:53:08.521373 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.521561 kubelet[2812]: E0702 07:53:08.521388 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.521709 kubelet[2812]: E0702 07:53:08.521611 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.521709 kubelet[2812]: W0702 07:53:08.521707 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.521903 kubelet[2812]: E0702 07:53:08.521722 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.572312 env[1736]: time="2024-07-02T07:53:08.572257709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wwwlk,Uid:d2246965-fd78-40da-ad4a-f61e249c5c02,Namespace:calico-system,Attempt:0,}" Jul 2 07:53:08.600701 env[1736]: time="2024-07-02T07:53:08.600604750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:08.600854 env[1736]: time="2024-07-02T07:53:08.600712368Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:08.600854 env[1736]: time="2024-07-02T07:53:08.600743813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:08.600981 env[1736]: time="2024-07-02T07:53:08.600933187Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b pid=3348 runtime=io.containerd.runc.v2 Jul 2 07:53:08.622530 kubelet[2812]: E0702 07:53:08.622499 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.622530 kubelet[2812]: W0702 07:53:08.622535 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.622766 kubelet[2812]: E0702 07:53:08.622560 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.622911 kubelet[2812]: E0702 07:53:08.622894 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.622977 kubelet[2812]: W0702 07:53:08.622911 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.622977 kubelet[2812]: E0702 07:53:08.622941 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.623233 kubelet[2812]: E0702 07:53:08.623216 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.623233 kubelet[2812]: W0702 07:53:08.623232 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.623356 kubelet[2812]: E0702 07:53:08.623249 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.623557 kubelet[2812]: E0702 07:53:08.623540 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.623557 kubelet[2812]: W0702 07:53:08.623555 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.623685 kubelet[2812]: E0702 07:53:08.623572 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.623857 kubelet[2812]: E0702 07:53:08.623840 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.623857 kubelet[2812]: W0702 07:53:08.623856 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.624106 kubelet[2812]: E0702 07:53:08.623872 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.624251 kubelet[2812]: E0702 07:53:08.624226 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.624319 kubelet[2812]: W0702 07:53:08.624252 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.624371 kubelet[2812]: E0702 07:53:08.624352 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.624551 kubelet[2812]: E0702 07:53:08.624536 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.624551 kubelet[2812]: W0702 07:53:08.624551 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.624672 kubelet[2812]: E0702 07:53:08.624644 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.626457 kubelet[2812]: E0702 07:53:08.624800 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.626457 kubelet[2812]: W0702 07:53:08.624810 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.626457 kubelet[2812]: E0702 07:53:08.624897 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.626457 kubelet[2812]: E0702 07:53:08.625047 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.626457 kubelet[2812]: W0702 07:53:08.625055 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.626457 kubelet[2812]: E0702 07:53:08.625142 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.626457 kubelet[2812]: E0702 07:53:08.625284 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.626457 kubelet[2812]: W0702 07:53:08.625291 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.626457 kubelet[2812]: E0702 07:53:08.625372 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.626457 kubelet[2812]: E0702 07:53:08.625538 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.626924 kubelet[2812]: W0702 07:53:08.625547 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.626924 kubelet[2812]: E0702 07:53:08.625561 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.626924 kubelet[2812]: E0702 07:53:08.625793 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.626924 kubelet[2812]: W0702 07:53:08.625813 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.626924 kubelet[2812]: E0702 07:53:08.625901 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.626924 kubelet[2812]: E0702 07:53:08.626056 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.626924 kubelet[2812]: W0702 07:53:08.626064 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.626924 kubelet[2812]: E0702 07:53:08.626149 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.626924 kubelet[2812]: E0702 07:53:08.626294 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.626924 kubelet[2812]: W0702 07:53:08.626302 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.627306 kubelet[2812]: E0702 07:53:08.626391 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.627306 kubelet[2812]: E0702 07:53:08.626549 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.627306 kubelet[2812]: W0702 07:53:08.626558 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.627306 kubelet[2812]: E0702 07:53:08.626652 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.630627 kubelet[2812]: E0702 07:53:08.630602 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.630627 kubelet[2812]: W0702 07:53:08.630624 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.630798 kubelet[2812]: E0702 07:53:08.630779 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.630957 kubelet[2812]: E0702 07:53:08.630932 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.630957 kubelet[2812]: W0702 07:53:08.630947 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.631079 kubelet[2812]: E0702 07:53:08.631034 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.631475 kubelet[2812]: E0702 07:53:08.631429 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.631475 kubelet[2812]: W0702 07:53:08.631471 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.631606 kubelet[2812]: E0702 07:53:08.631559 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.631720 kubelet[2812]: E0702 07:53:08.631706 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.631789 kubelet[2812]: W0702 07:53:08.631720 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.631834 kubelet[2812]: E0702 07:53:08.631800 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.639375 kubelet[2812]: E0702 07:53:08.639338 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.639375 kubelet[2812]: W0702 07:53:08.639368 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.639618 kubelet[2812]: E0702 07:53:08.639469 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.639690 kubelet[2812]: E0702 07:53:08.639673 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.639748 kubelet[2812]: W0702 07:53:08.639689 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.640067 kubelet[2812]: E0702 07:53:08.639811 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.640067 kubelet[2812]: E0702 07:53:08.639968 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.640067 kubelet[2812]: W0702 07:53:08.639980 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.640251 kubelet[2812]: E0702 07:53:08.640087 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.640251 kubelet[2812]: E0702 07:53:08.640234 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.640251 kubelet[2812]: W0702 07:53:08.640243 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.640384 kubelet[2812]: E0702 07:53:08.640258 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.640545 kubelet[2812]: E0702 07:53:08.640520 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.640545 kubelet[2812]: W0702 07:53:08.640535 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.640668 kubelet[2812]: E0702 07:53:08.640552 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.640811 kubelet[2812]: E0702 07:53:08.640764 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.640811 kubelet[2812]: W0702 07:53:08.640774 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.640811 kubelet[2812]: E0702 07:53:08.640786 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.651124 systemd[1]: Started cri-containerd-db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b.scope. Jul 2 07:53:08.670331 kubelet[2812]: E0702 07:53:08.670228 2812 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:53:08.670331 kubelet[2812]: W0702 07:53:08.670251 2812 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:53:08.670331 kubelet[2812]: E0702 07:53:08.670274 2812 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.767000 audit: BPF prog-id=121 op=LOAD Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3348 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462316163393366353635366336363337376532653335356537626435 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3348 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462316163393366353635366336363337376532653335356537626435 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit: BPF prog-id=122 op=LOAD Jul 2 07:53:08.768000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e3190 items=0 ppid=3348 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462316163393366353635366336363337376532653335356537626435 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit: BPF prog-id=123 op=LOAD Jul 2 07:53:08.768000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e31d8 items=0 ppid=3348 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462316163393366353635366336363337376532653335356537626435 Jul 2 07:53:08.768000 audit: BPF prog-id=123 op=UNLOAD Jul 2 07:53:08.768000 audit: BPF prog-id=122 op=UNLOAD Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.768000 audit: BPF prog-id=124 op=LOAD Jul 2 07:53:08.768000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e35e8 items=0 ppid=3348 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462316163393366353635366336363337376532653335356537626435 Jul 2 07:53:08.786593 env[1736]: time="2024-07-02T07:53:08.786551848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54994d5cb5-j2fz9,Uid:02409cfe-68d0-4957-be09-8f432718fa4d,Namespace:calico-system,Attempt:0,}" Jul 2 07:53:08.789882 env[1736]: time="2024-07-02T07:53:08.789833821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wwwlk,Uid:d2246965-fd78-40da-ad4a-f61e249c5c02,Namespace:calico-system,Attempt:0,} returns sandbox id \"db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b\"" Jul 2 07:53:08.797116 env[1736]: time="2024-07-02T07:53:08.797053142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:53:08.848624 env[1736]: time="2024-07-02T07:53:08.848546965Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:08.848924 env[1736]: time="2024-07-02T07:53:08.848882275Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:08.849061 env[1736]: time="2024-07-02T07:53:08.849035415Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:08.849540 env[1736]: time="2024-07-02T07:53:08.849466388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f15ff544e676d1c772c4d65e7e521c005ce686ee0ff83218e6cb0724329a6cf pid=3417 runtime=io.containerd.runc.v2 Jul 2 07:53:08.878140 systemd[1]: Started cri-containerd-3f15ff544e676d1c772c4d65e7e521c005ce686ee0ff83218e6cb0724329a6cf.scope. Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.921000 audit: BPF prog-id=125 op=LOAD Jul 2 07:53:08.922000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.922000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3417 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313566663534346536373664316337373263346436356537653532 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3417 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313566663534346536373664316337373263346436356537653532 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.923000 audit: BPF prog-id=126 op=LOAD Jul 2 07:53:08.923000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000363d40 items=0 ppid=3417 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313566663534346536373664316337373263346436356537653532 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.924000 audit: BPF prog-id=127 op=LOAD Jul 2 07:53:08.924000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000363d88 items=0 ppid=3417 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313566663534346536373664316337373263346436356537653532 Jul 2 07:53:08.925000 audit: BPF prog-id=127 op=UNLOAD Jul 2 07:53:08.925000 audit: BPF prog-id=126 op=UNLOAD Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:08.925000 audit: BPF prog-id=128 op=LOAD Jul 2 07:53:08.925000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e8198 items=0 ppid=3417 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:08.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313566663534346536373664316337373263346436356537653532 Jul 2 07:53:08.967540 env[1736]: time="2024-07-02T07:53:08.967454185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54994d5cb5-j2fz9,Uid:02409cfe-68d0-4957-be09-8f432718fa4d,Namespace:calico-system,Attempt:0,} returns sandbox id \"3f15ff544e676d1c772c4d65e7e521c005ce686ee0ff83218e6cb0724329a6cf\"" Jul 2 07:53:09.061000 audit[3451]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:09.061000 audit[3451]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdd07e4ca0 a2=0 a3=7ffdd07e4c8c items=0 ppid=3061 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:09.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:09.068000 audit[3451]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:09.068000 audit[3451]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd07e4ca0 a2=0 a3=0 items=0 ppid=3061 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:09.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:10.016155 kubelet[2812]: E0702 07:53:10.015520 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkmmj" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" Jul 2 07:53:10.392842 env[1736]: time="2024-07-02T07:53:10.392726038Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:10.396514 env[1736]: time="2024-07-02T07:53:10.396471651Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:10.398918 env[1736]: time="2024-07-02T07:53:10.398876220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:10.401746 env[1736]: time="2024-07-02T07:53:10.401706452Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:10.402199 env[1736]: time="2024-07-02T07:53:10.402159906Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:53:10.404849 env[1736]: time="2024-07-02T07:53:10.404814983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 07:53:10.408690 env[1736]: time="2024-07-02T07:53:10.408636602Z" level=info msg="CreateContainer within sandbox \"db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:53:10.439306 env[1736]: time="2024-07-02T07:53:10.439256158Z" level=info msg="CreateContainer within sandbox \"db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e0039f83129cbaf69e9a9574a001995c436328816f46a60358f6719a1671cd7a\"" Jul 2 07:53:10.442040 env[1736]: time="2024-07-02T07:53:10.442000556Z" level=info msg="StartContainer for \"e0039f83129cbaf69e9a9574a001995c436328816f46a60358f6719a1671cd7a\"" Jul 2 07:53:10.495897 systemd[1]: Started cri-containerd-e0039f83129cbaf69e9a9574a001995c436328816f46a60358f6719a1671cd7a.scope. Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f933e5222f8 items=0 ppid=3348 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:10.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530303339663833313239636261663639653961393537346130303139 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit: BPF prog-id=129 op=LOAD Jul 2 07:53:10.659000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00030c208 items=0 ppid=3348 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:10.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530303339663833313239636261663639653961393537346130303139 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit: BPF prog-id=130 op=LOAD Jul 2 07:53:10.659000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00030c258 items=0 ppid=3348 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:10.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530303339663833313239636261663639653961393537346130303139 Jul 2 07:53:10.659000 audit: BPF prog-id=130 op=UNLOAD Jul 2 07:53:10.659000 audit: BPF prog-id=129 op=UNLOAD Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:10.659000 audit: BPF prog-id=131 op=LOAD Jul 2 07:53:10.659000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00030c2e8 items=0 ppid=3348 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:10.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530303339663833313239636261663639653961393537346130303139 Jul 2 07:53:10.688752 env[1736]: time="2024-07-02T07:53:10.688700662Z" level=info msg="StartContainer for \"e0039f83129cbaf69e9a9574a001995c436328816f46a60358f6719a1671cd7a\" returns successfully" Jul 2 07:53:10.731761 systemd[1]: cri-containerd-e0039f83129cbaf69e9a9574a001995c436328816f46a60358f6719a1671cd7a.scope: Deactivated successfully. Jul 2 07:53:10.732000 audit: BPF prog-id=131 op=UNLOAD Jul 2 07:53:10.767942 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e0039f83129cbaf69e9a9574a001995c436328816f46a60358f6719a1671cd7a-rootfs.mount: Deactivated successfully. Jul 2 07:53:10.811745 env[1736]: time="2024-07-02T07:53:10.811693376Z" level=info msg="shim disconnected" id=e0039f83129cbaf69e9a9574a001995c436328816f46a60358f6719a1671cd7a Jul 2 07:53:10.812125 env[1736]: time="2024-07-02T07:53:10.812099182Z" level=warning msg="cleaning up after shim disconnected" id=e0039f83129cbaf69e9a9574a001995c436328816f46a60358f6719a1671cd7a namespace=k8s.io Jul 2 07:53:10.812271 env[1736]: time="2024-07-02T07:53:10.812255672Z" level=info msg="cleaning up dead shim" Jul 2 07:53:10.824681 env[1736]: time="2024-07-02T07:53:10.824638282Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:53:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3497 runtime=io.containerd.runc.v2\n" Jul 2 07:53:12.012665 kubelet[2812]: E0702 07:53:12.012289 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkmmj" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" Jul 2 07:53:13.310930 env[1736]: time="2024-07-02T07:53:13.310898042Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:13.315110 env[1736]: time="2024-07-02T07:53:13.315070260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:13.317419 env[1736]: time="2024-07-02T07:53:13.317378751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:13.319880 env[1736]: time="2024-07-02T07:53:13.319844251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:13.320588 env[1736]: time="2024-07-02T07:53:13.320557353Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 07:53:13.325954 env[1736]: time="2024-07-02T07:53:13.325916453Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:53:13.349154 env[1736]: time="2024-07-02T07:53:13.349094598Z" level=info msg="CreateContainer within sandbox \"3f15ff544e676d1c772c4d65e7e521c005ce686ee0ff83218e6cb0724329a6cf\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 07:53:13.382089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2259143348.mount: Deactivated successfully. Jul 2 07:53:13.384589 env[1736]: time="2024-07-02T07:53:13.384328292Z" level=info msg="CreateContainer within sandbox \"3f15ff544e676d1c772c4d65e7e521c005ce686ee0ff83218e6cb0724329a6cf\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a135136ec48fad1cdb4ea30d97844b53c784afb81511bf0211d2b1485d83a1e6\"" Jul 2 07:53:13.385175 env[1736]: time="2024-07-02T07:53:13.385147874Z" level=info msg="StartContainer for \"a135136ec48fad1cdb4ea30d97844b53c784afb81511bf0211d2b1485d83a1e6\"" Jul 2 07:53:13.436640 systemd[1]: Started cri-containerd-a135136ec48fad1cdb4ea30d97844b53c784afb81511bf0211d2b1485d83a1e6.scope. Jul 2 07:53:13.490026 kernel: kauditd_printk_skb: 166 callbacks suppressed Jul 2 07:53:13.490195 kernel: audit: type=1400 audit(1719906793.471:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.507527 kernel: audit: type=1400 audit(1719906793.471:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.513629 kernel: audit: type=1400 audit(1719906793.471:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.521459 kernel: audit: type=1400 audit(1719906793.471:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.532864 kernel: audit: type=1400 audit(1719906793.471:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.533013 kernel: audit: type=1400 audit(1719906793.471:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.539466 kernel: audit: type=1400 audit(1719906793.471:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.549993 kernel: audit: type=1400 audit(1719906793.471:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.550134 kernel: audit: type=1400 audit(1719906793.471:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.555179 kernel: audit: type=1400 audit(1719906793.471:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.471000 audit: BPF prog-id=132 op=LOAD Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3417 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:13.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333531333665633438666164316364623465613330643937383434 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3417 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:13.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333531333665633438666164316364623465613330643937383434 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.494000 audit: BPF prog-id=133 op=LOAD Jul 2 07:53:13.494000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f4690 items=0 ppid=3417 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:13.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333531333665633438666164316364623465613330643937383434 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit: BPF prog-id=134 op=LOAD Jul 2 07:53:13.496000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002f46d8 items=0 ppid=3417 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:13.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333531333665633438666164316364623465613330643937383434 Jul 2 07:53:13.496000 audit: BPF prog-id=134 op=UNLOAD Jul 2 07:53:13.496000 audit: BPF prog-id=133 op=UNLOAD Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:13.496000 audit: BPF prog-id=135 op=LOAD Jul 2 07:53:13.496000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002f4ae8 items=0 ppid=3417 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:13.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333531333665633438666164316364623465613330643937383434 Jul 2 07:53:13.590250 env[1736]: time="2024-07-02T07:53:13.590139023Z" level=info msg="StartContainer for \"a135136ec48fad1cdb4ea30d97844b53c784afb81511bf0211d2b1485d83a1e6\" returns successfully" Jul 2 07:53:14.012411 kubelet[2812]: E0702 07:53:14.012322 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkmmj" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" Jul 2 07:53:14.162608 kubelet[2812]: I0702 07:53:14.162538 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-54994d5cb5-j2fz9" podStartSLOduration=1.8100548 podStartE2EDuration="6.162500434s" podCreationTimestamp="2024-07-02 07:53:08 +0000 UTC" firstStartedPulling="2024-07-02 07:53:08.970067054 +0000 UTC m=+22.421586800" lastFinishedPulling="2024-07-02 07:53:13.322512671 +0000 UTC m=+26.774032434" observedRunningTime="2024-07-02 07:53:14.162321444 +0000 UTC m=+27.613841217" watchObservedRunningTime="2024-07-02 07:53:14.162500434 +0000 UTC m=+27.614020205" Jul 2 07:53:15.149139 kubelet[2812]: I0702 07:53:15.149107 2812 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:53:16.013361 kubelet[2812]: E0702 07:53:16.012958 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkmmj" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" Jul 2 07:53:18.013274 kubelet[2812]: E0702 07:53:18.013209 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkmmj" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" Jul 2 07:53:19.047167 env[1736]: time="2024-07-02T07:53:19.047111783Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:19.050081 env[1736]: time="2024-07-02T07:53:19.050034901Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:19.052300 env[1736]: time="2024-07-02T07:53:19.052259872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:19.054216 env[1736]: time="2024-07-02T07:53:19.054173909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:19.054862 env[1736]: time="2024-07-02T07:53:19.054816422Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:53:19.058607 env[1736]: time="2024-07-02T07:53:19.058568453Z" level=info msg="CreateContainer within sandbox \"db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:53:19.077737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1327780434.mount: Deactivated successfully. Jul 2 07:53:19.085536 env[1736]: time="2024-07-02T07:53:19.085484292Z" level=info msg="CreateContainer within sandbox \"db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293\"" Jul 2 07:53:19.087602 env[1736]: time="2024-07-02T07:53:19.086228200Z" level=info msg="StartContainer for \"ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293\"" Jul 2 07:53:19.120275 systemd[1]: run-containerd-runc-k8s.io-ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293-runc.7rwlpm.mount: Deactivated successfully. Jul 2 07:53:19.124362 systemd[1]: Started cri-containerd-ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293.scope. Jul 2 07:53:19.157238 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 07:53:19.157385 kernel: audit: type=1400 audit(1719906799.151:983): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f7e8c1e2cb8 items=0 ppid=3348 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361326138346265613163303664313038633461653865383666383337 Jul 2 07:53:19.171488 kernel: audit: type=1300 audit(1719906799.151:983): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f7e8c1e2cb8 items=0 ppid=3348 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.171615 kernel: audit: type=1327 audit(1719906799.151:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361326138346265613163303664313038633461653865383666383337 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.182908 kernel: audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.183046 kernel: audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.192585 kernel: audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.203883 kernel: audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.210780 kernel: audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.210970 env[1736]: time="2024-07-02T07:53:19.205662634Z" level=info msg="StartContainer for \"ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293\" returns successfully" Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.226089 kernel: audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.226226 kernel: audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.151000 audit: BPF prog-id=136 op=LOAD Jul 2 07:53:19.151000 audit[3559]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003ae488 items=0 ppid=3348 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361326138346265613163303664313038633461653865383666383337 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit: BPF prog-id=137 op=LOAD Jul 2 07:53:19.157000 audit[3559]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003ae4d8 items=0 ppid=3348 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361326138346265613163303664313038633461653865383666383337 Jul 2 07:53:19.157000 audit: BPF prog-id=137 op=UNLOAD Jul 2 07:53:19.157000 audit: BPF prog-id=136 op=UNLOAD Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:19.157000 audit: BPF prog-id=138 op=LOAD Jul 2 07:53:19.157000 audit[3559]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003ae568 items=0 ppid=3348 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361326138346265613163303664313038633461653865383666383337 Jul 2 07:53:19.926755 env[1736]: time="2024-07-02T07:53:19.926686445Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:53:19.929992 systemd[1]: cri-containerd-ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293.scope: Deactivated successfully. Jul 2 07:53:19.932000 audit: BPF prog-id=138 op=UNLOAD Jul 2 07:53:19.941457 kubelet[2812]: I0702 07:53:19.941416 2812 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 07:53:19.987007 kubelet[2812]: I0702 07:53:19.986171 2812 topology_manager.go:215] "Topology Admit Handler" podUID="cd620bbe-2a99-4e15-abef-cc67615a20a4" podNamespace="kube-system" podName="coredns-7db6d8ff4d-5qmrm" Jul 2 07:53:19.992478 systemd[1]: Created slice kubepods-burstable-podcd620bbe_2a99_4e15_abef_cc67615a20a4.slice. Jul 2 07:53:19.996470 kubelet[2812]: I0702 07:53:19.996418 2812 topology_manager.go:215] "Topology Admit Handler" podUID="70345e66-a66e-42cb-8f8d-910952041175" podNamespace="kube-system" podName="coredns-7db6d8ff4d-v4k4b" Jul 2 07:53:19.998797 kubelet[2812]: I0702 07:53:19.998745 2812 topology_manager.go:215] "Topology Admit Handler" podUID="1c3254f3-a58e-4469-92ba-51f59dd14308" podNamespace="calico-system" podName="calico-kube-controllers-55cd76d879-4m94x" Jul 2 07:53:20.010531 systemd[1]: Created slice kubepods-besteffort-pod1c3254f3_a58e_4469_92ba_51f59dd14308.slice. Jul 2 07:53:20.018752 systemd[1]: Created slice kubepods-burstable-pod70345e66_a66e_42cb_8f8d_910952041175.slice. Jul 2 07:53:20.026240 systemd[1]: Created slice kubepods-besteffort-podb0fe9189_3a75_490d_8563_da840bc1e64a.slice. Jul 2 07:53:20.034706 env[1736]: time="2024-07-02T07:53:20.034255722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xkmmj,Uid:b0fe9189-3a75-490d-8563-da840bc1e64a,Namespace:calico-system,Attempt:0,}" Jul 2 07:53:20.073353 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293-rootfs.mount: Deactivated successfully. Jul 2 07:53:20.139534 kubelet[2812]: I0702 07:53:20.139487 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tqkjl\" (UniqueName: \"kubernetes.io/projected/70345e66-a66e-42cb-8f8d-910952041175-kube-api-access-tqkjl\") pod \"coredns-7db6d8ff4d-v4k4b\" (UID: \"70345e66-a66e-42cb-8f8d-910952041175\") " pod="kube-system/coredns-7db6d8ff4d-v4k4b" Jul 2 07:53:20.140059 kubelet[2812]: I0702 07:53:20.140039 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rf5kn\" (UniqueName: \"kubernetes.io/projected/cd620bbe-2a99-4e15-abef-cc67615a20a4-kube-api-access-rf5kn\") pod \"coredns-7db6d8ff4d-5qmrm\" (UID: \"cd620bbe-2a99-4e15-abef-cc67615a20a4\") " pod="kube-system/coredns-7db6d8ff4d-5qmrm" Jul 2 07:53:20.140271 kubelet[2812]: I0702 07:53:20.140223 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/70345e66-a66e-42cb-8f8d-910952041175-config-volume\") pod \"coredns-7db6d8ff4d-v4k4b\" (UID: \"70345e66-a66e-42cb-8f8d-910952041175\") " pod="kube-system/coredns-7db6d8ff4d-v4k4b" Jul 2 07:53:20.140479 kubelet[2812]: I0702 07:53:20.140418 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1c3254f3-a58e-4469-92ba-51f59dd14308-tigera-ca-bundle\") pod \"calico-kube-controllers-55cd76d879-4m94x\" (UID: \"1c3254f3-a58e-4469-92ba-51f59dd14308\") " pod="calico-system/calico-kube-controllers-55cd76d879-4m94x" Jul 2 07:53:20.140629 kubelet[2812]: I0702 07:53:20.140616 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cd620bbe-2a99-4e15-abef-cc67615a20a4-config-volume\") pod \"coredns-7db6d8ff4d-5qmrm\" (UID: \"cd620bbe-2a99-4e15-abef-cc67615a20a4\") " pod="kube-system/coredns-7db6d8ff4d-5qmrm" Jul 2 07:53:20.141142 kubelet[2812]: I0702 07:53:20.141118 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4k8qc\" (UniqueName: \"kubernetes.io/projected/1c3254f3-a58e-4469-92ba-51f59dd14308-kube-api-access-4k8qc\") pod \"calico-kube-controllers-55cd76d879-4m94x\" (UID: \"1c3254f3-a58e-4469-92ba-51f59dd14308\") " pod="calico-system/calico-kube-controllers-55cd76d879-4m94x" Jul 2 07:53:20.232455 env[1736]: time="2024-07-02T07:53:20.232302607Z" level=error msg="Failed to destroy network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.236305 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2-shm.mount: Deactivated successfully. Jul 2 07:53:20.238293 env[1736]: time="2024-07-02T07:53:20.238249849Z" level=error msg="encountered an error cleaning up failed sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.238540 env[1736]: time="2024-07-02T07:53:20.238414871Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xkmmj,Uid:b0fe9189-3a75-490d-8563-da840bc1e64a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.238927 kubelet[2812]: E0702 07:53:20.238866 2812 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.239054 kubelet[2812]: E0702 07:53:20.238954 2812 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xkmmj" Jul 2 07:53:20.239054 kubelet[2812]: E0702 07:53:20.238998 2812 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xkmmj" Jul 2 07:53:20.239196 kubelet[2812]: E0702 07:53:20.239084 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xkmmj_calico-system(b0fe9189-3a75-490d-8563-da840bc1e64a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xkmmj_calico-system(b0fe9189-3a75-490d-8563-da840bc1e64a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xkmmj" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" Jul 2 07:53:20.296428 env[1736]: time="2024-07-02T07:53:20.296377868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5qmrm,Uid:cd620bbe-2a99-4e15-abef-cc67615a20a4,Namespace:kube-system,Attempt:0,}" Jul 2 07:53:20.322875 env[1736]: time="2024-07-02T07:53:20.322825342Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55cd76d879-4m94x,Uid:1c3254f3-a58e-4469-92ba-51f59dd14308,Namespace:calico-system,Attempt:0,}" Jul 2 07:53:20.326198 env[1736]: time="2024-07-02T07:53:20.326143322Z" level=info msg="shim disconnected" id=ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293 Jul 2 07:53:20.326198 env[1736]: time="2024-07-02T07:53:20.326199047Z" level=warning msg="cleaning up after shim disconnected" id=ca2a84bea1c06d108c4ae8e86f837fd728f5d2f74fa0186dabea32b7f576e293 namespace=k8s.io Jul 2 07:53:20.326589 env[1736]: time="2024-07-02T07:53:20.326211136Z" level=info msg="cleaning up dead shim" Jul 2 07:53:20.332015 env[1736]: time="2024-07-02T07:53:20.331971368Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v4k4b,Uid:70345e66-a66e-42cb-8f8d-910952041175,Namespace:kube-system,Attempt:0,}" Jul 2 07:53:20.337552 env[1736]: time="2024-07-02T07:53:20.337509328Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:53:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3632 runtime=io.containerd.runc.v2\n" Jul 2 07:53:20.491762 env[1736]: time="2024-07-02T07:53:20.490215121Z" level=error msg="Failed to destroy network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.491762 env[1736]: time="2024-07-02T07:53:20.490650033Z" level=error msg="encountered an error cleaning up failed sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.491762 env[1736]: time="2024-07-02T07:53:20.490720412Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55cd76d879-4m94x,Uid:1c3254f3-a58e-4469-92ba-51f59dd14308,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.492095 kubelet[2812]: E0702 07:53:20.491346 2812 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.492095 kubelet[2812]: E0702 07:53:20.491404 2812 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55cd76d879-4m94x" Jul 2 07:53:20.492095 kubelet[2812]: E0702 07:53:20.491426 2812 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55cd76d879-4m94x" Jul 2 07:53:20.492273 kubelet[2812]: E0702 07:53:20.491497 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55cd76d879-4m94x_calico-system(1c3254f3-a58e-4469-92ba-51f59dd14308)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55cd76d879-4m94x_calico-system(1c3254f3-a58e-4469-92ba-51f59dd14308)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55cd76d879-4m94x" podUID="1c3254f3-a58e-4469-92ba-51f59dd14308" Jul 2 07:53:20.514073 env[1736]: time="2024-07-02T07:53:20.514012902Z" level=error msg="Failed to destroy network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.514697 env[1736]: time="2024-07-02T07:53:20.514642127Z" level=error msg="encountered an error cleaning up failed sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.514893 env[1736]: time="2024-07-02T07:53:20.514857278Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5qmrm,Uid:cd620bbe-2a99-4e15-abef-cc67615a20a4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.515668 kubelet[2812]: E0702 07:53:20.515199 2812 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.515668 kubelet[2812]: E0702 07:53:20.515266 2812 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-5qmrm" Jul 2 07:53:20.515668 kubelet[2812]: E0702 07:53:20.515293 2812 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-5qmrm" Jul 2 07:53:20.515875 kubelet[2812]: E0702 07:53:20.515350 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-5qmrm_kube-system(cd620bbe-2a99-4e15-abef-cc67615a20a4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-5qmrm_kube-system(cd620bbe-2a99-4e15-abef-cc67615a20a4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5qmrm" podUID="cd620bbe-2a99-4e15-abef-cc67615a20a4" Jul 2 07:53:20.537664 env[1736]: time="2024-07-02T07:53:20.537616543Z" level=error msg="Failed to destroy network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.538165 env[1736]: time="2024-07-02T07:53:20.538134017Z" level=error msg="encountered an error cleaning up failed sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.538309 env[1736]: time="2024-07-02T07:53:20.538284286Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v4k4b,Uid:70345e66-a66e-42cb-8f8d-910952041175,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.538673 kubelet[2812]: E0702 07:53:20.538633 2812 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:20.538778 kubelet[2812]: E0702 07:53:20.538715 2812 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-v4k4b" Jul 2 07:53:20.538778 kubelet[2812]: E0702 07:53:20.538744 2812 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-v4k4b" Jul 2 07:53:20.539001 kubelet[2812]: E0702 07:53:20.538820 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-v4k4b_kube-system(70345e66-a66e-42cb-8f8d-910952041175)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-v4k4b_kube-system(70345e66-a66e-42cb-8f8d-910952041175)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v4k4b" podUID="70345e66-a66e-42cb-8f8d-910952041175" Jul 2 07:53:21.169462 kubelet[2812]: I0702 07:53:21.169418 2812 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:21.170583 env[1736]: time="2024-07-02T07:53:21.170543569Z" level=info msg="StopPodSandbox for \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\"" Jul 2 07:53:21.171723 kubelet[2812]: I0702 07:53:21.171273 2812 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:21.172065 env[1736]: time="2024-07-02T07:53:21.172031075Z" level=info msg="StopPodSandbox for \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\"" Jul 2 07:53:21.173143 kubelet[2812]: I0702 07:53:21.173125 2812 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:21.173957 env[1736]: time="2024-07-02T07:53:21.173909868Z" level=info msg="StopPodSandbox for \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\"" Jul 2 07:53:21.177947 kubelet[2812]: I0702 07:53:21.177522 2812 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:21.178886 env[1736]: time="2024-07-02T07:53:21.178851765Z" level=info msg="StopPodSandbox for \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\"" Jul 2 07:53:21.185960 env[1736]: time="2024-07-02T07:53:21.185478621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:53:21.284949 env[1736]: time="2024-07-02T07:53:21.284884498Z" level=error msg="StopPodSandbox for \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\" failed" error="failed to destroy network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:21.285385 kubelet[2812]: E0702 07:53:21.285162 2812 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:21.285385 kubelet[2812]: E0702 07:53:21.285228 2812 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2"} Jul 2 07:53:21.285385 kubelet[2812]: E0702 07:53:21.285298 2812 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b0fe9189-3a75-490d-8563-da840bc1e64a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:53:21.285599 kubelet[2812]: E0702 07:53:21.285386 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b0fe9189-3a75-490d-8563-da840bc1e64a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xkmmj" podUID="b0fe9189-3a75-490d-8563-da840bc1e64a" Jul 2 07:53:21.290014 env[1736]: time="2024-07-02T07:53:21.289948309Z" level=error msg="StopPodSandbox for \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\" failed" error="failed to destroy network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:21.290725 kubelet[2812]: E0702 07:53:21.290470 2812 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:21.290725 kubelet[2812]: E0702 07:53:21.290556 2812 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2"} Jul 2 07:53:21.290725 kubelet[2812]: E0702 07:53:21.290600 2812 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cd620bbe-2a99-4e15-abef-cc67615a20a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:53:21.290725 kubelet[2812]: E0702 07:53:21.290649 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cd620bbe-2a99-4e15-abef-cc67615a20a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5qmrm" podUID="cd620bbe-2a99-4e15-abef-cc67615a20a4" Jul 2 07:53:21.303980 env[1736]: time="2024-07-02T07:53:21.303916950Z" level=error msg="StopPodSandbox for \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\" failed" error="failed to destroy network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:21.304507 kubelet[2812]: E0702 07:53:21.304416 2812 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:21.304650 kubelet[2812]: E0702 07:53:21.304523 2812 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78"} Jul 2 07:53:21.304650 kubelet[2812]: E0702 07:53:21.304566 2812 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c3254f3-a58e-4469-92ba-51f59dd14308\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:53:21.304650 kubelet[2812]: E0702 07:53:21.304608 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c3254f3-a58e-4469-92ba-51f59dd14308\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55cd76d879-4m94x" podUID="1c3254f3-a58e-4469-92ba-51f59dd14308" Jul 2 07:53:21.308867 env[1736]: time="2024-07-02T07:53:21.308803087Z" level=error msg="StopPodSandbox for \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\" failed" error="failed to destroy network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:53:21.309177 kubelet[2812]: E0702 07:53:21.309132 2812 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:21.309272 kubelet[2812]: E0702 07:53:21.309182 2812 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8"} Jul 2 07:53:21.309272 kubelet[2812]: E0702 07:53:21.309230 2812 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"70345e66-a66e-42cb-8f8d-910952041175\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:53:21.309883 kubelet[2812]: E0702 07:53:21.309260 2812 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"70345e66-a66e-42cb-8f8d-910952041175\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v4k4b" podUID="70345e66-a66e-42cb-8f8d-910952041175" Jul 2 07:53:21.326665 kubelet[2812]: I0702 07:53:21.326370 2812 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:53:21.384000 audit[3830]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:21.384000 audit[3830]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe4bbfafa0 a2=0 a3=7ffe4bbfaf8c items=0 ppid=3061 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:21.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:21.385000 audit[3830]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:21.385000 audit[3830]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe4bbfafa0 a2=0 a3=7ffe4bbfaf8c items=0 ppid=3061 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:21.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:28.977665 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount398717704.mount: Deactivated successfully. Jul 2 07:53:29.022397 env[1736]: time="2024-07-02T07:53:29.022345278Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:29.025186 env[1736]: time="2024-07-02T07:53:29.025144535Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:29.027187 env[1736]: time="2024-07-02T07:53:29.027146699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:29.029318 env[1736]: time="2024-07-02T07:53:29.029276936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:29.029777 env[1736]: time="2024-07-02T07:53:29.029736903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:53:29.070590 env[1736]: time="2024-07-02T07:53:29.070519075Z" level=info msg="CreateContainer within sandbox \"db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:53:29.100726 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2096703285.mount: Deactivated successfully. Jul 2 07:53:29.108250 env[1736]: time="2024-07-02T07:53:29.108186211Z" level=info msg="CreateContainer within sandbox \"db1ac93f5656c66377e2e355e7bd50ad7f1c085bcf24fef40d9eec41896f5b0b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f21a1d472bffb8317a19f61889276a16210ca62b2df6debc8b09441aaf41c507\"" Jul 2 07:53:29.109580 env[1736]: time="2024-07-02T07:53:29.109523861Z" level=info msg="StartContainer for \"f21a1d472bffb8317a19f61889276a16210ca62b2df6debc8b09441aaf41c507\"" Jul 2 07:53:29.132356 systemd[1]: Started cri-containerd-f21a1d472bffb8317a19f61889276a16210ca62b2df6debc8b09441aaf41c507.scope. Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180856 kernel: kauditd_printk_skb: 40 callbacks suppressed Jul 2 07:53:29.181019 kernel: audit: type=1400 audit(1719906809.166:992): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.181064 kernel: audit: type=1300 audit(1719906809.166:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb2c01ec2d8 items=0 ppid=3348 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:29.166000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb2c01ec2d8 items=0 ppid=3348 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:29.187789 kernel: audit: type=1327 audit(1719906809.166:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316131643437326266666238333137613139663631383839323736 Jul 2 07:53:29.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316131643437326266666238333137613139663631383839323736 Jul 2 07:53:29.193384 kernel: audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.203404 kernel: audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.203521 kernel: audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.214206 kernel: audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.214358 kernel: audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.220532 kernel: audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.226475 kernel: audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.166000 audit: BPF prog-id=139 op=LOAD Jul 2 07:53:29.166000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a0188 items=0 ppid=3348 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:29.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316131643437326266666238333137613139663631383839323736 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.167000 audit: BPF prog-id=140 op=LOAD Jul 2 07:53:29.167000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003a01d8 items=0 ppid=3348 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:29.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316131643437326266666238333137613139663631383839323736 Jul 2 07:53:29.180000 audit: BPF prog-id=140 op=UNLOAD Jul 2 07:53:29.180000 audit: BPF prog-id=139 op=UNLOAD Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:29.180000 audit: BPF prog-id=141 op=LOAD Jul 2 07:53:29.180000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a0268 items=0 ppid=3348 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:29.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316131643437326266666238333137613139663631383839323736 Jul 2 07:53:29.236908 env[1736]: time="2024-07-02T07:53:29.236815695Z" level=info msg="StartContainer for \"f21a1d472bffb8317a19f61889276a16210ca62b2df6debc8b09441aaf41c507\" returns successfully" Jul 2 07:53:29.349264 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:53:29.349974 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:53:30.267344 kubelet[2812]: I0702 07:53:30.267250 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wwwlk" podStartSLOduration=2.022119018 podStartE2EDuration="22.257006335s" podCreationTimestamp="2024-07-02 07:53:08 +0000 UTC" firstStartedPulling="2024-07-02 07:53:08.796118496 +0000 UTC m=+22.247638257" lastFinishedPulling="2024-07-02 07:53:29.031005811 +0000 UTC m=+42.482525574" observedRunningTime="2024-07-02 07:53:30.256699282 +0000 UTC m=+43.708219052" watchObservedRunningTime="2024-07-02 07:53:30.257006335 +0000 UTC m=+43.708526104" Jul 2 07:53:30.945000 audit[3941]: AVC avc: denied { write } for pid=3941 comm="tee" name="fd" dev="proc" ino=25458 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:53:30.945000 audit[3941]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd146f4a0d a2=241 a3=1b6 items=1 ppid=3916 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:30.945000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:53:30.945000 audit: PATH item=0 name="/dev/fd/63" inode=25443 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:30.945000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:53:30.958000 audit[3956]: AVC avc: denied { write } for pid=3956 comm="tee" name="fd" dev="proc" ino=25464 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:53:30.967000 audit[3946]: AVC avc: denied { write } for pid=3946 comm="tee" name="fd" dev="proc" ino=24419 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:53:30.967000 audit[3946]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff87fcba1c a2=241 a3=1b6 items=1 ppid=3910 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:30.969000 audit[3953]: AVC avc: denied { write } for pid=3953 comm="tee" name="fd" dev="proc" ino=25471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:53:30.969000 audit[3953]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb685ea1e a2=241 a3=1b6 items=1 ppid=3908 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:30.969000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:53:30.969000 audit: PATH item=0 name="/dev/fd/63" inode=24409 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:30.969000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:53:30.967000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:53:30.967000 audit: PATH item=0 name="/dev/fd/63" inode=24403 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:30.967000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:53:30.958000 audit[3956]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb1876a1c a2=241 a3=1b6 items=1 ppid=3913 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:30.958000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:53:30.958000 audit: PATH item=0 name="/dev/fd/63" inode=24414 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:30.958000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:53:30.997000 audit[3972]: AVC avc: denied { write } for pid=3972 comm="tee" name="fd" dev="proc" ino=25485 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:53:30.997000 audit[3972]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde8851a0c a2=241 a3=1b6 items=1 ppid=3917 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:30.997000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:53:30.997000 audit: PATH item=0 name="/dev/fd/63" inode=25475 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:30.997000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:53:31.037000 audit[3980]: AVC avc: denied { write } for pid=3980 comm="tee" name="fd" dev="proc" ino=25491 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:53:31.037000 audit[3980]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd607fca1d a2=241 a3=1b6 items=1 ppid=3923 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.037000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:53:31.037000 audit: PATH item=0 name="/dev/fd/63" inode=25487 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:31.037000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:53:31.052000 audit[3983]: AVC avc: denied { write } for pid=3983 comm="tee" name="fd" dev="proc" ino=25495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:53:31.052000 audit[3983]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4c060a1c a2=241 a3=1b6 items=1 ppid=3934 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.052000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:53:31.052000 audit: PATH item=0 name="/dev/fd/63" inode=25488 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:31.052000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:53:31.221255 kubelet[2812]: I0702 07:53:31.221137 2812 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:53:31.567090 (udev-worker)[3874]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:53:31.580870 systemd-networkd[1461]: vxlan.calico: Link UP Jul 2 07:53:31.580882 systemd-networkd[1461]: vxlan.calico: Gained carrier Jul 2 07:53:31.679424 (udev-worker)[4042]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.686000 audit: BPF prog-id=142 op=LOAD Jul 2 07:53:31.686000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd816b8f0 a2=70 a3=7f75dd458000 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit: BPF prog-id=142 op=UNLOAD Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit: BPF prog-id=143 op=LOAD Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd816b8f0 a2=70 a3=6f items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit: BPF prog-id=143 op=UNLOAD Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdd816b8a0 a2=70 a3=7ffdd816b8f0 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit: BPF prog-id=144 op=LOAD Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdd816b880 a2=70 a3=7ffdd816b8f0 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit: BPF prog-id=144 op=UNLOAD Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd816b960 a2=70 a3=0 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd816b950 a2=70 a3=0 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd816b8c0 a2=70 a3=0 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdd816b990 a2=70 a3=8d0a00 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd816b990 a2=70 a3=8cd880 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.688000 audit: BPF prog-id=145 op=LOAD Jul 2 07:53:31.688000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd816b8b0 a2=70 a3=0 items=0 ppid=3936 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:53:31.706000 audit[4052]: AVC avc: denied { bpf } for pid=4052 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.706000 audit[4052]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6dbf1f10 a2=70 a3=fff80800 items=0 ppid=3936 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:53:31.712000 audit[4052]: AVC avc: denied { bpf } for pid=4052 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:31.712000 audit[4052]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6dbf1de0 a2=70 a3=3 items=0 ppid=3936 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.712000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:53:31.719000 audit: BPF prog-id=145 op=UNLOAD Jul 2 07:53:31.815000 audit[4079]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4079 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:31.824000 audit[4077]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4077 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:31.825000 audit[4076]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=4076 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:31.825000 audit[4076]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffdc1aa6140 a2=0 a3=7ffdc1aa612c items=0 ppid=3936 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.825000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:31.824000 audit[4077]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffff3e84ba0 a2=0 a3=7ffff3e84b8c items=0 ppid=3936 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.824000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:31.828000 audit[4078]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=4078 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:31.815000 audit[4079]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff7e550f60 a2=0 a3=7fff7e550f4c items=0 ppid=3936 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.815000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:31.828000 audit[4078]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc89cc86b0 a2=0 a3=7ffc89cc869c items=0 ppid=3936 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:31.828000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:33.063072 systemd-networkd[1461]: vxlan.calico: Gained IPv6LL Jul 2 07:53:34.014015 env[1736]: time="2024-07-02T07:53:34.013406041Z" level=info msg="StopPodSandbox for \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\"" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.161 [INFO][4107] k8s.go 608: Cleaning up netns ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.166 [INFO][4107] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" iface="eth0" netns="/var/run/netns/cni-c21fe60c-75fe-0246-0cbc-ab92b3032e27" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.166 [INFO][4107] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" iface="eth0" netns="/var/run/netns/cni-c21fe60c-75fe-0246-0cbc-ab92b3032e27" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.167 [INFO][4107] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" iface="eth0" netns="/var/run/netns/cni-c21fe60c-75fe-0246-0cbc-ab92b3032e27" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.167 [INFO][4107] k8s.go 615: Releasing IP address(es) ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.167 [INFO][4107] utils.go 188: Calico CNI releasing IP address ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.457 [INFO][4114] ipam_plugin.go 411: Releasing address using handleID ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.459 [INFO][4114] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.460 [INFO][4114] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.489 [WARNING][4114] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.489 [INFO][4114] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.511 [INFO][4114] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:34.516776 env[1736]: 2024-07-02 07:53:34.514 [INFO][4107] k8s.go 621: Teardown processing complete. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:34.521468 systemd[1]: run-netns-cni\x2dc21fe60c\x2d75fe\x2d0246\x2d0cbc\x2dab92b3032e27.mount: Deactivated successfully. Jul 2 07:53:34.524748 env[1736]: time="2024-07-02T07:53:34.524027333Z" level=info msg="TearDown network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\" successfully" Jul 2 07:53:34.524748 env[1736]: time="2024-07-02T07:53:34.524066890Z" level=info msg="StopPodSandbox for \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\" returns successfully" Jul 2 07:53:34.525230 env[1736]: time="2024-07-02T07:53:34.525194008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v4k4b,Uid:70345e66-a66e-42cb-8f8d-910952041175,Namespace:kube-system,Attempt:1,}" Jul 2 07:53:34.769667 systemd-networkd[1461]: cali2a9ccba7796: Link UP Jul 2 07:53:34.775258 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:53:34.775378 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2a9ccba7796: link becomes ready Jul 2 07:53:34.774880 systemd-networkd[1461]: cali2a9ccba7796: Gained carrier Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.616 [INFO][4121] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0 coredns-7db6d8ff4d- kube-system 70345e66-a66e-42cb-8f8d-910952041175 718 0 2024-07-02 07:53:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-20-226 coredns-7db6d8ff4d-v4k4b eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2a9ccba7796 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v4k4b" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.616 [INFO][4121] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v4k4b" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.682 [INFO][4131] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" HandleID="k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.701 [INFO][4131] ipam_plugin.go 264: Auto assigning IP ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" HandleID="k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00036e040), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-20-226", "pod":"coredns-7db6d8ff4d-v4k4b", "timestamp":"2024-07-02 07:53:34.68292039 +0000 UTC"}, Hostname:"ip-172-31-20-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.701 [INFO][4131] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.702 [INFO][4131] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.702 [INFO][4131] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-226' Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.706 [INFO][4131] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.720 [INFO][4131] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.741 [INFO][4131] ipam.go 489: Trying affinity for 192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.744 [INFO][4131] ipam.go 155: Attempting to load block cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.746 [INFO][4131] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.746 [INFO][4131] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.84.0/26 handle="k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.749 [INFO][4131] ipam.go 1685: Creating new handle: k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2 Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.756 [INFO][4131] ipam.go 1203: Writing block in order to claim IPs block=192.168.84.0/26 handle="k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.761 [INFO][4131] ipam.go 1216: Successfully claimed IPs: [192.168.84.1/26] block=192.168.84.0/26 handle="k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.761 [INFO][4131] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.84.1/26] handle="k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" host="ip-172-31-20-226" Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.761 [INFO][4131] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:34.807684 env[1736]: 2024-07-02 07:53:34.761 [INFO][4131] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.84.1/26] IPv6=[] ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" HandleID="k8s-pod-network.85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.809141 env[1736]: 2024-07-02 07:53:34.765 [INFO][4121] k8s.go 386: Populated endpoint ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v4k4b" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"70345e66-a66e-42cb-8f8d-910952041175", ResourceVersion:"718", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"", Pod:"coredns-7db6d8ff4d-v4k4b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.84.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a9ccba7796", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:34.809141 env[1736]: 2024-07-02 07:53:34.765 [INFO][4121] k8s.go 387: Calico CNI using IPs: [192.168.84.1/32] ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v4k4b" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.809141 env[1736]: 2024-07-02 07:53:34.765 [INFO][4121] dataplane_linux.go 68: Setting the host side veth name to cali2a9ccba7796 ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v4k4b" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.809141 env[1736]: 2024-07-02 07:53:34.776 [INFO][4121] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v4k4b" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.809141 env[1736]: 2024-07-02 07:53:34.777 [INFO][4121] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v4k4b" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"70345e66-a66e-42cb-8f8d-910952041175", ResourceVersion:"718", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2", Pod:"coredns-7db6d8ff4d-v4k4b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.84.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a9ccba7796", MAC:"f2:76:2c:9d:c7:ea", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:34.809141 env[1736]: 2024-07-02 07:53:34.797 [INFO][4121] k8s.go 500: Wrote updated endpoint to datastore ContainerID="85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v4k4b" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:34.827000 audit[4150]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:34.838288 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 07:53:34.838409 kernel: audit: type=1325 audit(1719906814.827:1025): table=filter:101 family=2 entries=34 op=nft_register_chain pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:34.827000 audit[4150]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fffa41550b0 a2=0 a3=7fffa415509c items=0 ppid=3936 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:34.849463 kernel: audit: type=1300 audit(1719906814.827:1025): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fffa41550b0 a2=0 a3=7fffa415509c items=0 ppid=3936 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:34.827000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:34.856508 kernel: audit: type=1327 audit(1719906814.827:1025): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:34.856559 env[1736]: time="2024-07-02T07:53:34.855081411Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:34.856559 env[1736]: time="2024-07-02T07:53:34.855220164Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:34.856559 env[1736]: time="2024-07-02T07:53:34.855241515Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:34.856559 env[1736]: time="2024-07-02T07:53:34.855528460Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2 pid=4159 runtime=io.containerd.runc.v2 Jul 2 07:53:34.887213 systemd[1]: Started cri-containerd-85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2.scope. Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.930077 kernel: audit: type=1400 audit(1719906814.917:1026): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.930297 kernel: audit: type=1400 audit(1719906814.917:1027): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.930357 kernel: audit: type=1400 audit(1719906814.917:1028): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.935803 kernel: audit: type=1400 audit(1719906814.917:1029): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.945152 kernel: audit: type=1400 audit(1719906814.917:1030): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.945302 kernel: audit: type=1400 audit(1719906814.917:1031): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.923000 audit: BPF prog-id=146 op=LOAD Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4159 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:34.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353430666435353462663231356434653430663130663565346239 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4159 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:34.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353430666435353462663231356434653430663130663565346239 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.955470 kernel: audit: type=1400 audit(1719906814.917:1032): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.925000 audit: BPF prog-id=147 op=LOAD Jul 2 07:53:34.925000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024ed0 items=0 ppid=4159 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:34.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353430666435353462663231356434653430663130663565346239 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.939000 audit: BPF prog-id=148 op=LOAD Jul 2 07:53:34.939000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024f18 items=0 ppid=4159 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:34.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353430666435353462663231356434653430663130663565346239 Jul 2 07:53:34.954000 audit: BPF prog-id=148 op=UNLOAD Jul 2 07:53:34.954000 audit: BPF prog-id=147 op=UNLOAD Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:34.954000 audit: BPF prog-id=149 op=LOAD Jul 2 07:53:34.954000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025328 items=0 ppid=4159 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:34.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353430666435353462663231356434653430663130663565346239 Jul 2 07:53:34.993061 env[1736]: time="2024-07-02T07:53:34.993016627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v4k4b,Uid:70345e66-a66e-42cb-8f8d-910952041175,Namespace:kube-system,Attempt:1,} returns sandbox id \"85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2\"" Jul 2 07:53:35.008704 env[1736]: time="2024-07-02T07:53:35.008657434Z" level=info msg="CreateContainer within sandbox \"85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:53:35.023496 env[1736]: time="2024-07-02T07:53:35.020813764Z" level=info msg="StopPodSandbox for \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\"" Jul 2 07:53:35.023496 env[1736]: time="2024-07-02T07:53:35.022174578Z" level=info msg="StopPodSandbox for \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\"" Jul 2 07:53:35.050082 env[1736]: time="2024-07-02T07:53:35.049942113Z" level=info msg="CreateContainer within sandbox \"85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"52101a52db7043327fc579ee9615d18df4d361762b8b9a3750bc31ab6fa58b3c\"" Jul 2 07:53:35.055727 env[1736]: time="2024-07-02T07:53:35.055682588Z" level=info msg="StartContainer for \"52101a52db7043327fc579ee9615d18df4d361762b8b9a3750bc31ab6fa58b3c\"" Jul 2 07:53:35.154828 systemd[1]: Started cri-containerd-52101a52db7043327fc579ee9615d18df4d361762b8b9a3750bc31ab6fa58b3c.scope. Jul 2 07:53:35.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.206000 audit: BPF prog-id=150 op=LOAD Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4159 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313031613532646237303433333237666335373965653936313564 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4159 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313031613532646237303433333237666335373965653936313564 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit: BPF prog-id=151 op=LOAD Jul 2 07:53:35.207000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000252b0 items=0 ppid=4159 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313031613532646237303433333237666335373965653936313564 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.207000 audit: BPF prog-id=152 op=LOAD Jul 2 07:53:35.207000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000252f8 items=0 ppid=4159 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313031613532646237303433333237666335373965653936313564 Jul 2 07:53:35.208000 audit: BPF prog-id=152 op=UNLOAD Jul 2 07:53:35.208000 audit: BPF prog-id=151 op=UNLOAD Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.208000 audit: BPF prog-id=153 op=LOAD Jul 2 07:53:35.208000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025708 items=0 ppid=4159 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313031613532646237303433333237666335373965653936313564 Jul 2 07:53:35.280512 env[1736]: time="2024-07-02T07:53:35.277347707Z" level=info msg="StartContainer for \"52101a52db7043327fc579ee9615d18df4d361762b8b9a3750bc31ab6fa58b3c\" returns successfully" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.171 [INFO][4227] k8s.go 608: Cleaning up netns ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.171 [INFO][4227] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" iface="eth0" netns="/var/run/netns/cni-cb0b70e1-f19b-9797-4763-d3edcec43d2a" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.171 [INFO][4227] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" iface="eth0" netns="/var/run/netns/cni-cb0b70e1-f19b-9797-4763-d3edcec43d2a" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.171 [INFO][4227] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" iface="eth0" netns="/var/run/netns/cni-cb0b70e1-f19b-9797-4763-d3edcec43d2a" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.171 [INFO][4227] k8s.go 615: Releasing IP address(es) ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.171 [INFO][4227] utils.go 188: Calico CNI releasing IP address ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.288 [INFO][4258] ipam_plugin.go 411: Releasing address using handleID ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.289 [INFO][4258] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.289 [INFO][4258] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.305 [WARNING][4258] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.305 [INFO][4258] ipam_plugin.go 439: Releasing address using workloadID ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.307 [INFO][4258] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:35.313843 env[1736]: 2024-07-02 07:53:35.311 [INFO][4227] k8s.go 621: Teardown processing complete. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:35.315086 env[1736]: time="2024-07-02T07:53:35.314296249Z" level=info msg="TearDown network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\" successfully" Jul 2 07:53:35.315086 env[1736]: time="2024-07-02T07:53:35.314336301Z" level=info msg="StopPodSandbox for \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\" returns successfully" Jul 2 07:53:35.315520 env[1736]: time="2024-07-02T07:53:35.315484906Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xkmmj,Uid:b0fe9189-3a75-490d-8563-da840bc1e64a,Namespace:calico-system,Attempt:1,}" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.144 [INFO][4228] k8s.go 608: Cleaning up netns ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.144 [INFO][4228] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" iface="eth0" netns="/var/run/netns/cni-71ab6a5a-6667-94ca-0ed0-523a23434a04" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.144 [INFO][4228] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" iface="eth0" netns="/var/run/netns/cni-71ab6a5a-6667-94ca-0ed0-523a23434a04" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.145 [INFO][4228] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" iface="eth0" netns="/var/run/netns/cni-71ab6a5a-6667-94ca-0ed0-523a23434a04" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.145 [INFO][4228] k8s.go 615: Releasing IP address(es) ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.145 [INFO][4228] utils.go 188: Calico CNI releasing IP address ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.316 [INFO][4257] ipam_plugin.go 411: Releasing address using handleID ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.316 [INFO][4257] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.316 [INFO][4257] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.327 [WARNING][4257] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.327 [INFO][4257] ipam_plugin.go 439: Releasing address using workloadID ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.329 [INFO][4257] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:35.337726 env[1736]: 2024-07-02 07:53:35.334 [INFO][4228] k8s.go 621: Teardown processing complete. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:35.338935 env[1736]: time="2024-07-02T07:53:35.338894216Z" level=info msg="TearDown network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\" successfully" Jul 2 07:53:35.339052 env[1736]: time="2024-07-02T07:53:35.339031335Z" level=info msg="StopPodSandbox for \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\" returns successfully" Jul 2 07:53:35.340186 env[1736]: time="2024-07-02T07:53:35.340153820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5qmrm,Uid:cd620bbe-2a99-4e15-abef-cc67615a20a4,Namespace:kube-system,Attempt:1,}" Jul 2 07:53:35.537799 systemd[1]: run-netns-cni\x2d71ab6a5a\x2d6667\x2d94ca\x2d0ed0\x2d523a23434a04.mount: Deactivated successfully. Jul 2 07:53:35.537934 systemd[1]: run-netns-cni\x2dcb0b70e1\x2df19b\x2d9797\x2d4763\x2dd3edcec43d2a.mount: Deactivated successfully. Jul 2 07:53:35.663511 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec1e069b5a0: link becomes ready Jul 2 07:53:35.666063 systemd-networkd[1461]: caliec1e069b5a0: Link UP Jul 2 07:53:35.666287 systemd-networkd[1461]: caliec1e069b5a0: Gained carrier Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.430 [INFO][4285] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0 csi-node-driver- calico-system b0fe9189-3a75-490d-8563-da840bc1e64a 729 0 2024-07-02 07:53:08 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-20-226 csi-node-driver-xkmmj eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliec1e069b5a0 [] []}} ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Namespace="calico-system" Pod="csi-node-driver-xkmmj" WorkloadEndpoint="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.430 [INFO][4285] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Namespace="calico-system" Pod="csi-node-driver-xkmmj" WorkloadEndpoint="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.584 [INFO][4311] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" HandleID="k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.613 [INFO][4311] ipam_plugin.go 264: Auto assigning IP ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" HandleID="k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002932d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-20-226", "pod":"csi-node-driver-xkmmj", "timestamp":"2024-07-02 07:53:35.584761402 +0000 UTC"}, Hostname:"ip-172-31-20-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.613 [INFO][4311] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.613 [INFO][4311] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.613 [INFO][4311] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-226' Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.616 [INFO][4311] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.625 [INFO][4311] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.632 [INFO][4311] ipam.go 489: Trying affinity for 192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.635 [INFO][4311] ipam.go 155: Attempting to load block cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.639 [INFO][4311] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.639 [INFO][4311] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.84.0/26 handle="k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.641 [INFO][4311] ipam.go 1685: Creating new handle: k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.647 [INFO][4311] ipam.go 1203: Writing block in order to claim IPs block=192.168.84.0/26 handle="k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.654 [INFO][4311] ipam.go 1216: Successfully claimed IPs: [192.168.84.2/26] block=192.168.84.0/26 handle="k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.655 [INFO][4311] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.84.2/26] handle="k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" host="ip-172-31-20-226" Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.655 [INFO][4311] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:35.695757 env[1736]: 2024-07-02 07:53:35.655 [INFO][4311] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.84.2/26] IPv6=[] ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" HandleID="k8s-pod-network.584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.697193 env[1736]: 2024-07-02 07:53:35.658 [INFO][4285] k8s.go 386: Populated endpoint ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Namespace="calico-system" Pod="csi-node-driver-xkmmj" WorkloadEndpoint="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b0fe9189-3a75-490d-8563-da840bc1e64a", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"", Pod:"csi-node-driver-xkmmj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliec1e069b5a0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:35.697193 env[1736]: 2024-07-02 07:53:35.658 [INFO][4285] k8s.go 387: Calico CNI using IPs: [192.168.84.2/32] ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Namespace="calico-system" Pod="csi-node-driver-xkmmj" WorkloadEndpoint="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.697193 env[1736]: 2024-07-02 07:53:35.658 [INFO][4285] dataplane_linux.go 68: Setting the host side veth name to caliec1e069b5a0 ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Namespace="calico-system" Pod="csi-node-driver-xkmmj" WorkloadEndpoint="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.697193 env[1736]: 2024-07-02 07:53:35.663 [INFO][4285] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Namespace="calico-system" Pod="csi-node-driver-xkmmj" WorkloadEndpoint="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.697193 env[1736]: 2024-07-02 07:53:35.663 [INFO][4285] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Namespace="calico-system" Pod="csi-node-driver-xkmmj" WorkloadEndpoint="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b0fe9189-3a75-490d-8563-da840bc1e64a", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c", Pod:"csi-node-driver-xkmmj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliec1e069b5a0", MAC:"12:e9:a3:a9:81:0c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:35.697193 env[1736]: 2024-07-02 07:53:35.689 [INFO][4285] k8s.go 500: Wrote updated endpoint to datastore ContainerID="584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c" Namespace="calico-system" Pod="csi-node-driver-xkmmj" WorkloadEndpoint="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:35.723462 env[1736]: time="2024-07-02T07:53:35.721370293Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:35.723462 env[1736]: time="2024-07-02T07:53:35.721495051Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:35.723462 env[1736]: time="2024-07-02T07:53:35.721528601Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:35.723462 env[1736]: time="2024-07-02T07:53:35.721732137Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c pid=4345 runtime=io.containerd.runc.v2 Jul 2 07:53:35.749870 systemd-networkd[1461]: calie1d06b0bbeb: Link UP Jul 2 07:53:35.751059 systemd-networkd[1461]: calie1d06b0bbeb: Gained carrier Jul 2 07:53:35.751640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie1d06b0bbeb: link becomes ready Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.471 [INFO][4299] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0 coredns-7db6d8ff4d- kube-system cd620bbe-2a99-4e15-abef-cc67615a20a4 728 0 2024-07-02 07:53:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-20-226 coredns-7db6d8ff4d-5qmrm eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie1d06b0bbeb [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5qmrm" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.473 [INFO][4299] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5qmrm" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.603 [INFO][4315] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" HandleID="k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.617 [INFO][4315] ipam_plugin.go 264: Auto assigning IP ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" HandleID="k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000370820), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-20-226", "pod":"coredns-7db6d8ff4d-5qmrm", "timestamp":"2024-07-02 07:53:35.603157012 +0000 UTC"}, Hostname:"ip-172-31-20-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.618 [INFO][4315] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.655 [INFO][4315] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.655 [INFO][4315] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-226' Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.660 [INFO][4315] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.672 [INFO][4315] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.698 [INFO][4315] ipam.go 489: Trying affinity for 192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.702 [INFO][4315] ipam.go 155: Attempting to load block cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.707 [INFO][4315] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.707 [INFO][4315] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.84.0/26 handle="k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.711 [INFO][4315] ipam.go 1685: Creating new handle: k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2 Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.719 [INFO][4315] ipam.go 1203: Writing block in order to claim IPs block=192.168.84.0/26 handle="k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.744 [INFO][4315] ipam.go 1216: Successfully claimed IPs: [192.168.84.3/26] block=192.168.84.0/26 handle="k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.744 [INFO][4315] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.84.3/26] handle="k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" host="ip-172-31-20-226" Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.744 [INFO][4315] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:35.778652 env[1736]: 2024-07-02 07:53:35.744 [INFO][4315] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.84.3/26] IPv6=[] ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" HandleID="k8s-pod-network.f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.779803 env[1736]: 2024-07-02 07:53:35.747 [INFO][4299] k8s.go 386: Populated endpoint ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5qmrm" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"cd620bbe-2a99-4e15-abef-cc67615a20a4", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"", Pod:"coredns-7db6d8ff4d-5qmrm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.84.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d06b0bbeb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:35.779803 env[1736]: 2024-07-02 07:53:35.747 [INFO][4299] k8s.go 387: Calico CNI using IPs: [192.168.84.3/32] ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5qmrm" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.779803 env[1736]: 2024-07-02 07:53:35.747 [INFO][4299] dataplane_linux.go 68: Setting the host side veth name to calie1d06b0bbeb ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5qmrm" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.779803 env[1736]: 2024-07-02 07:53:35.751 [INFO][4299] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5qmrm" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.779803 env[1736]: 2024-07-02 07:53:35.753 [INFO][4299] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5qmrm" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"cd620bbe-2a99-4e15-abef-cc67615a20a4", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2", Pod:"coredns-7db6d8ff4d-5qmrm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.84.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d06b0bbeb", MAC:"4a:d5:46:3b:0c:27", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:35.779803 env[1736]: 2024-07-02 07:53:35.772 [INFO][4299] k8s.go 500: Wrote updated endpoint to datastore ContainerID="f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5qmrm" WorkloadEndpoint="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:35.811488 systemd[1]: run-containerd-runc-k8s.io-584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c-runc.q6l8Ub.mount: Deactivated successfully. Jul 2 07:53:35.818586 systemd[1]: Started cri-containerd-584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c.scope. Jul 2 07:53:35.813000 audit[4371]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4371 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:35.813000 audit[4371]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffce99e7370 a2=0 a3=7ffce99e735c items=0 ppid=3936 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.813000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:35.842036 env[1736]: time="2024-07-02T07:53:35.841950790Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:35.842784 env[1736]: time="2024-07-02T07:53:35.842727093Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:35.842973 env[1736]: time="2024-07-02T07:53:35.842947250Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:35.846672 env[1736]: time="2024-07-02T07:53:35.846608816Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2 pid=4384 runtime=io.containerd.runc.v2 Jul 2 07:53:35.873468 systemd[1]: Started cri-containerd-f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2.scope. Jul 2 07:53:35.910000 audit[4413]: NETFILTER_CFG table=filter:103 family=2 entries=40 op=nft_register_chain pid=4413 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:35.910000 audit[4413]: SYSCALL arch=c000003e syscall=46 success=yes exit=21072 a0=3 a1=7ffe14ade090 a2=0 a3=7ffe14ade07c items=0 ppid=3936 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.911000 audit: BPF prog-id=154 op=LOAD Jul 2 07:53:35.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4345 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346235326563626239336438393935653739383438623733336365 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4345 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346235326563626239336438393935653739383438623733336365 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit: BPF prog-id=155 op=LOAD Jul 2 07:53:35.912000 audit[4357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e1970 items=0 ppid=4345 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346235326563626239336438393935653739383438623733336365 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit: BPF prog-id=156 op=LOAD Jul 2 07:53:35.912000 audit[4357]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e19b8 items=0 ppid=4345 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346235326563626239336438393935653739383438623733336365 Jul 2 07:53:35.912000 audit: BPF prog-id=156 op=UNLOAD Jul 2 07:53:35.912000 audit: BPF prog-id=155 op=UNLOAD Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { perfmon } for pid=4357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit[4357]: AVC avc: denied { bpf } for pid=4357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.912000 audit: BPF prog-id=157 op=LOAD Jul 2 07:53:35.912000 audit[4357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e1dc8 items=0 ppid=4345 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346235326563626239336438393935653739383438623733336365 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.918000 audit: BPF prog-id=158 op=LOAD Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4384 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303264613333626438393335353832643961306335636435616130 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4384 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303264613333626438393335353832643961306335636435616130 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.919000 audit: BPF prog-id=159 op=LOAD Jul 2 07:53:35.919000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000328b10 items=0 ppid=4384 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303264613333626438393335353832643961306335636435616130 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit: BPF prog-id=160 op=LOAD Jul 2 07:53:35.920000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000328b58 items=0 ppid=4384 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303264613333626438393335353832643961306335636435616130 Jul 2 07:53:35.920000 audit: BPF prog-id=160 op=UNLOAD Jul 2 07:53:35.920000 audit: BPF prog-id=159 op=UNLOAD Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:35.920000 audit: BPF prog-id=161 op=LOAD Jul 2 07:53:35.920000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000328f68 items=0 ppid=4384 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:35.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303264613333626438393335353832643961306335636435616130 Jul 2 07:53:35.947246 env[1736]: time="2024-07-02T07:53:35.947195847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xkmmj,Uid:b0fe9189-3a75-490d-8563-da840bc1e64a,Namespace:calico-system,Attempt:1,} returns sandbox id \"584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c\"" Jul 2 07:53:35.949708 env[1736]: time="2024-07-02T07:53:35.949670532Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:53:35.969498 env[1736]: time="2024-07-02T07:53:35.969431585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5qmrm,Uid:cd620bbe-2a99-4e15-abef-cc67615a20a4,Namespace:kube-system,Attempt:1,} returns sandbox id \"f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2\"" Jul 2 07:53:35.977182 env[1736]: time="2024-07-02T07:53:35.977139515Z" level=info msg="CreateContainer within sandbox \"f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:53:35.992458 env[1736]: time="2024-07-02T07:53:35.992386562Z" level=info msg="CreateContainer within sandbox \"f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"87fbfde542f06c260404f7c8d5c16d0f1dbda1641f0533052fa258054c3553f8\"" Jul 2 07:53:35.994854 env[1736]: time="2024-07-02T07:53:35.994810425Z" level=info msg="StartContainer for \"87fbfde542f06c260404f7c8d5c16d0f1dbda1641f0533052fa258054c3553f8\"" Jul 2 07:53:36.013100 systemd[1]: Started cri-containerd-87fbfde542f06c260404f7c8d5c16d0f1dbda1641f0533052fa258054c3553f8.scope. Jul 2 07:53:36.023279 env[1736]: time="2024-07-02T07:53:36.023222291Z" level=info msg="StopPodSandbox for \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\"" Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.039000 audit: BPF prog-id=162 op=LOAD Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4384 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837666266646535343266303663323630343034663763386435633136 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4384 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837666266646535343266303663323630343034663763386435633136 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.040000 audit: BPF prog-id=163 op=LOAD Jul 2 07:53:36.040000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098830 items=0 ppid=4384 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837666266646535343266303663323630343034663763386435633136 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit: BPF prog-id=164 op=LOAD Jul 2 07:53:36.041000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098878 items=0 ppid=4384 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837666266646535343266303663323630343034663763386435633136 Jul 2 07:53:36.041000 audit: BPF prog-id=164 op=UNLOAD Jul 2 07:53:36.041000 audit: BPF prog-id=163 op=UNLOAD Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.041000 audit: BPF prog-id=165 op=LOAD Jul 2 07:53:36.041000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098c88 items=0 ppid=4384 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837666266646535343266303663323630343034663763386435633136 Jul 2 07:53:36.078055 env[1736]: time="2024-07-02T07:53:36.077854834Z" level=info msg="StartContainer for \"87fbfde542f06c260404f7c8d5c16d0f1dbda1641f0533052fa258054c3553f8\" returns successfully" Jul 2 07:53:36.151638 systemd-networkd[1461]: cali2a9ccba7796: Gained IPv6LL Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.227 [INFO][4478] k8s.go 608: Cleaning up netns ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.227 [INFO][4478] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" iface="eth0" netns="/var/run/netns/cni-6ca77171-8930-e0d2-3166-8813ce67e948" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.227 [INFO][4478] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" iface="eth0" netns="/var/run/netns/cni-6ca77171-8930-e0d2-3166-8813ce67e948" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.228 [INFO][4478] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" iface="eth0" netns="/var/run/netns/cni-6ca77171-8930-e0d2-3166-8813ce67e948" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.228 [INFO][4478] k8s.go 615: Releasing IP address(es) ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.228 [INFO][4478] utils.go 188: Calico CNI releasing IP address ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.311 [INFO][4495] ipam_plugin.go 411: Releasing address using handleID ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.311 [INFO][4495] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.311 [INFO][4495] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.333 [WARNING][4495] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.334 [INFO][4495] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.337 [INFO][4495] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:36.343806 env[1736]: 2024-07-02 07:53:36.339 [INFO][4478] k8s.go 621: Teardown processing complete. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:36.344500 env[1736]: time="2024-07-02T07:53:36.344133337Z" level=info msg="TearDown network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\" successfully" Jul 2 07:53:36.344500 env[1736]: time="2024-07-02T07:53:36.344174664Z" level=info msg="StopPodSandbox for \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\" returns successfully" Jul 2 07:53:36.344988 env[1736]: time="2024-07-02T07:53:36.344951770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55cd76d879-4m94x,Uid:1c3254f3-a58e-4469-92ba-51f59dd14308,Namespace:calico-system,Attempt:1,}" Jul 2 07:53:36.357203 kubelet[2812]: I0702 07:53:36.357131 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-v4k4b" podStartSLOduration=35.357107332 podStartE2EDuration="35.357107332s" podCreationTimestamp="2024-07-02 07:53:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:53:36.325359229 +0000 UTC m=+49.776878999" watchObservedRunningTime="2024-07-02 07:53:36.357107332 +0000 UTC m=+49.808627102" Jul 2 07:53:36.414926 kubelet[2812]: I0702 07:53:36.414851 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-5qmrm" podStartSLOduration=35.414831855 podStartE2EDuration="35.414831855s" podCreationTimestamp="2024-07-02 07:53:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:53:36.375568222 +0000 UTC m=+49.827087991" watchObservedRunningTime="2024-07-02 07:53:36.414831855 +0000 UTC m=+49.866351625" Jul 2 07:53:36.453000 audit[4515]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=4515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:36.453000 audit[4515]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff6a7bcb00 a2=0 a3=7fff6a7bcaec items=0 ppid=3061 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:36.455000 audit[4515]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:36.455000 audit[4515]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff6a7bcb00 a2=0 a3=0 items=0 ppid=3061 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:36.525023 systemd[1]: run-netns-cni\x2d6ca77171\x2d8930\x2de0d2\x2d3166\x2d8813ce67e948.mount: Deactivated successfully. Jul 2 07:53:36.524000 audit[4518]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=4518 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:36.524000 audit[4518]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe806fbad0 a2=0 a3=7ffe806fbabc items=0 ppid=3061 pid=4518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:36.529000 audit[4518]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4518 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:36.529000 audit[4518]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe806fbad0 a2=0 a3=7ffe806fbabc items=0 ppid=3061 pid=4518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:36.688812 systemd-networkd[1461]: calib9ce3fdd110: Link UP Jul 2 07:53:36.694245 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:53:36.695670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib9ce3fdd110: link becomes ready Jul 2 07:53:36.694639 systemd-networkd[1461]: calib9ce3fdd110: Gained carrier Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.475 [INFO][4503] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0 calico-kube-controllers-55cd76d879- calico-system 1c3254f3-a58e-4469-92ba-51f59dd14308 743 0 2024-07-02 07:53:08 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55cd76d879 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-20-226 calico-kube-controllers-55cd76d879-4m94x eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calib9ce3fdd110 [] []}} ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Namespace="calico-system" Pod="calico-kube-controllers-55cd76d879-4m94x" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.475 [INFO][4503] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Namespace="calico-system" Pod="calico-kube-controllers-55cd76d879-4m94x" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.573 [INFO][4517] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" HandleID="k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.599 [INFO][4517] ipam_plugin.go 264: Auto assigning IP ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" HandleID="k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e7640), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-20-226", "pod":"calico-kube-controllers-55cd76d879-4m94x", "timestamp":"2024-07-02 07:53:36.573512617 +0000 UTC"}, Hostname:"ip-172-31-20-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.599 [INFO][4517] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.599 [INFO][4517] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.599 [INFO][4517] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-226' Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.603 [INFO][4517] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.619 [INFO][4517] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.639 [INFO][4517] ipam.go 489: Trying affinity for 192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.646 [INFO][4517] ipam.go 155: Attempting to load block cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.655 [INFO][4517] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.655 [INFO][4517] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.84.0/26 handle="k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.664 [INFO][4517] ipam.go 1685: Creating new handle: k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8 Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.669 [INFO][4517] ipam.go 1203: Writing block in order to claim IPs block=192.168.84.0/26 handle="k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.682 [INFO][4517] ipam.go 1216: Successfully claimed IPs: [192.168.84.4/26] block=192.168.84.0/26 handle="k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.682 [INFO][4517] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.84.4/26] handle="k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" host="ip-172-31-20-226" Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.683 [INFO][4517] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:36.715046 env[1736]: 2024-07-02 07:53:36.683 [INFO][4517] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.84.4/26] IPv6=[] ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" HandleID="k8s-pod-network.16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.718988 env[1736]: 2024-07-02 07:53:36.685 [INFO][4503] k8s.go 386: Populated endpoint ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Namespace="calico-system" Pod="calico-kube-controllers-55cd76d879-4m94x" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0", GenerateName:"calico-kube-controllers-55cd76d879-", Namespace:"calico-system", SelfLink:"", UID:"1c3254f3-a58e-4469-92ba-51f59dd14308", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55cd76d879", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"", Pod:"calico-kube-controllers-55cd76d879-4m94x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.84.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib9ce3fdd110", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:36.718988 env[1736]: 2024-07-02 07:53:36.685 [INFO][4503] k8s.go 387: Calico CNI using IPs: [192.168.84.4/32] ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Namespace="calico-system" Pod="calico-kube-controllers-55cd76d879-4m94x" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.718988 env[1736]: 2024-07-02 07:53:36.685 [INFO][4503] dataplane_linux.go 68: Setting the host side veth name to calib9ce3fdd110 ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Namespace="calico-system" Pod="calico-kube-controllers-55cd76d879-4m94x" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.718988 env[1736]: 2024-07-02 07:53:36.698 [INFO][4503] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Namespace="calico-system" Pod="calico-kube-controllers-55cd76d879-4m94x" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.718988 env[1736]: 2024-07-02 07:53:36.698 [INFO][4503] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Namespace="calico-system" Pod="calico-kube-controllers-55cd76d879-4m94x" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0", GenerateName:"calico-kube-controllers-55cd76d879-", Namespace:"calico-system", SelfLink:"", UID:"1c3254f3-a58e-4469-92ba-51f59dd14308", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55cd76d879", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8", Pod:"calico-kube-controllers-55cd76d879-4m94x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.84.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib9ce3fdd110", MAC:"d2:59:10:97:69:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:36.718988 env[1736]: 2024-07-02 07:53:36.712 [INFO][4503] k8s.go 500: Wrote updated endpoint to datastore ContainerID="16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8" Namespace="calico-system" Pod="calico-kube-controllers-55cd76d879-4m94x" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:36.737051 env[1736]: time="2024-07-02T07:53:36.736785931Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:36.737051 env[1736]: time="2024-07-02T07:53:36.736831088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:36.737051 env[1736]: time="2024-07-02T07:53:36.736848737Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:36.744000 audit[4555]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4555 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:53:36.744000 audit[4555]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7ffe98112340 a2=0 a3=7ffe9811232c items=0 ppid=3936 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.744000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:53:36.749393 env[1736]: time="2024-07-02T07:53:36.737099993Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8 pid=4549 runtime=io.containerd.runc.v2 Jul 2 07:53:36.765969 systemd[1]: run-containerd-runc-k8s.io-16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8-runc.5H9pgP.mount: Deactivated successfully. Jul 2 07:53:36.774412 systemd[1]: Started cri-containerd-16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8.scope. Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit: BPF prog-id=166 op=LOAD Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4549 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623932346565343238396166653235333962666139396133353436 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4549 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623932346565343238396166653235333962666139396133353436 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit: BPF prog-id=167 op=LOAD Jul 2 07:53:36.792000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00038a6c0 items=0 ppid=4549 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623932346565343238396166653235333962666139396133353436 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.792000 audit: BPF prog-id=168 op=LOAD Jul 2 07:53:36.792000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00038a708 items=0 ppid=4549 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623932346565343238396166653235333962666139396133353436 Jul 2 07:53:36.793000 audit: BPF prog-id=168 op=UNLOAD Jul 2 07:53:36.793000 audit: BPF prog-id=167 op=UNLOAD Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:36.793000 audit: BPF prog-id=169 op=LOAD Jul 2 07:53:36.793000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038ab18 items=0 ppid=4549 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:36.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623932346565343238396166653235333962666139396133353436 Jul 2 07:53:36.833816 env[1736]: time="2024-07-02T07:53:36.833767098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55cd76d879-4m94x,Uid:1c3254f3-a58e-4469-92ba-51f59dd14308,Namespace:calico-system,Attempt:1,} returns sandbox id \"16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8\"" Jul 2 07:53:36.957034 systemd[1]: Started sshd@7-172.31.20.226:22-139.178.89.65:44340.service. Jul 2 07:53:36.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.20.226:22-139.178.89.65:44340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:37.177000 audit[4590]: USER_ACCT pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:37.180916 sshd[4590]: Accepted publickey for core from 139.178.89.65 port 44340 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:53:37.180000 audit[4590]: CRED_ACQ pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:37.181000 audit[4590]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd60118500 a2=3 a3=0 items=0 ppid=1 pid=4590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:37.181000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:37.186814 sshd[4590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:37.198586 systemd[1]: Started session-8.scope. Jul 2 07:53:37.199825 systemd-logind[1726]: New session 8 of user core. Jul 2 07:53:37.211000 audit[4590]: USER_START pid=4590 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:37.214000 audit[4592]: CRED_ACQ pid=4592 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:37.409298 systemd-networkd[1461]: calie1d06b0bbeb: Gained IPv6LL Jul 2 07:53:37.568000 audit[4601]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:37.568000 audit[4601]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf9a8dd00 a2=0 a3=7ffdf9a8dcec items=0 ppid=3061 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:37.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:37.626000 audit[4601]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:53:37.626000 audit[4601]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdf9a8dd00 a2=0 a3=7ffdf9a8dcec items=0 ppid=3061 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:37.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:53:37.670041 systemd-networkd[1461]: caliec1e069b5a0: Gained IPv6LL Jul 2 07:53:37.723862 env[1736]: time="2024-07-02T07:53:37.723816630Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:37.727816 env[1736]: time="2024-07-02T07:53:37.727654932Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:37.730919 env[1736]: time="2024-07-02T07:53:37.730880419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:37.733042 env[1736]: time="2024-07-02T07:53:37.733007202Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:37.733341 env[1736]: time="2024-07-02T07:53:37.733302820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:53:37.735955 env[1736]: time="2024-07-02T07:53:37.735905244Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 07:53:37.740046 env[1736]: time="2024-07-02T07:53:37.740014445Z" level=info msg="CreateContainer within sandbox \"584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:53:37.780236 env[1736]: time="2024-07-02T07:53:37.780174477Z" level=info msg="CreateContainer within sandbox \"584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b953a2c7155a4acdcac6cf7326622a31c167222fc76219fd4478d68fbef03c42\"" Jul 2 07:53:37.781040 env[1736]: time="2024-07-02T07:53:37.781004064Z" level=info msg="StartContainer for \"b953a2c7155a4acdcac6cf7326622a31c167222fc76219fd4478d68fbef03c42\"" Jul 2 07:53:37.813833 systemd[1]: Started cri-containerd-b953a2c7155a4acdcac6cf7326622a31c167222fc76219fd4478d68fbef03c42.scope. Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f5f1936dd98 items=0 ppid=4345 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:37.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353361326337313535613461636463616336636637333236363232 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit: BPF prog-id=170 op=LOAD Jul 2 07:53:37.868000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002b88a8 items=0 ppid=4345 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:37.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353361326337313535613461636463616336636637333236363232 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.868000 audit: BPF prog-id=171 op=LOAD Jul 2 07:53:37.868000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002b88f8 items=0 ppid=4345 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:37.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353361326337313535613461636463616336636637333236363232 Jul 2 07:53:37.873000 audit: BPF prog-id=171 op=UNLOAD Jul 2 07:53:37.873000 audit: BPF prog-id=170 op=UNLOAD Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.873000 audit: BPF prog-id=172 op=LOAD Jul 2 07:53:37.873000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002b8988 items=0 ppid=4345 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:37.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353361326337313535613461636463616336636637333236363232 Jul 2 07:53:37.912517 env[1736]: time="2024-07-02T07:53:37.912458815Z" level=info msg="StartContainer for \"b953a2c7155a4acdcac6cf7326622a31c167222fc76219fd4478d68fbef03c42\" returns successfully" Jul 2 07:53:37.982124 kubelet[2812]: I0702 07:53:37.982085 2812 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:53:38.065642 sshd[4590]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:38.067000 audit[4590]: USER_END pid=4590 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:38.067000 audit[4590]: CRED_DISP pid=4590 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:38.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.20.226:22-139.178.89.65:44340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:38.071151 systemd[1]: sshd@7-172.31.20.226:22-139.178.89.65:44340.service: Deactivated successfully. Jul 2 07:53:38.072196 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:53:38.073311 systemd-logind[1726]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:53:38.074429 systemd-logind[1726]: Removed session 8. Jul 2 07:53:38.565755 systemd-networkd[1461]: calib9ce3fdd110: Gained IPv6LL Jul 2 07:53:40.645000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:40.648037 kernel: kauditd_printk_skb: 416 callbacks suppressed Jul 2 07:53:40.648129 kernel: audit: type=1400 audit(1719906820.645:1158): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:40.645000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c180c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:53:40.669460 kernel: audit: type=1300 audit(1719906820.645:1158): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c180c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:53:40.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:40.684463 kernel: audit: type=1327 audit(1719906820.645:1158): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:40.659000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:40.695459 kernel: audit: type=1400 audit(1719906820.659:1159): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:40.659000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c597c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:53:40.706453 kernel: audit: type=1300 audit(1719906820.659:1159): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c597c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:53:40.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:40.719460 kernel: audit: type=1327 audit(1719906820.659:1159): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:40.851824 env[1736]: time="2024-07-02T07:53:40.851776664Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.863213 env[1736]: time="2024-07-02T07:53:40.863161198Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.868079 env[1736]: time="2024-07-02T07:53:40.868031260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.874944 env[1736]: time="2024-07-02T07:53:40.874571331Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.875119 env[1736]: time="2024-07-02T07:53:40.875036883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 07:53:40.893596 env[1736]: time="2024-07-02T07:53:40.889796590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:53:40.915951 env[1736]: time="2024-07-02T07:53:40.915780186Z" level=info msg="CreateContainer within sandbox \"16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 07:53:41.033514 env[1736]: time="2024-07-02T07:53:41.033472675Z" level=info msg="CreateContainer within sandbox \"16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258\"" Jul 2 07:53:41.037546 env[1736]: time="2024-07-02T07:53:41.037505967Z" level=info msg="StartContainer for \"c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258\"" Jul 2 07:53:41.073036 systemd[1]: Started cri-containerd-c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258.scope. Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.117659 kernel: audit: type=1400 audit(1719906821.107:1160): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.117737 kernel: audit: type=1400 audit(1719906821.107:1161): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.128037 kernel: audit: type=1400 audit(1719906821.107:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.128122 kernel: audit: type=1400 audit(1719906821.107:1163): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.117000 audit: BPF prog-id=173 op=LOAD Jul 2 07:53:41.117000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.117000 audit[4691]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4549 pid=4691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:41.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336566363665636535656634626432613131373732373438353362 Jul 2 07:53:41.117000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.117000 audit[4691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4549 pid=4691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:41.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336566363665636535656634626432613131373732373438353362 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.118000 audit: BPF prog-id=174 op=LOAD Jul 2 07:53:41.118000 audit[4691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00022d1e0 items=0 ppid=4549 pid=4691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:41.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336566363665636535656634626432613131373732373438353362 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit: BPF prog-id=175 op=LOAD Jul 2 07:53:41.127000 audit[4691]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00022d228 items=0 ppid=4549 pid=4691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:41.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336566363665636535656634626432613131373732373438353362 Jul 2 07:53:41.127000 audit: BPF prog-id=175 op=UNLOAD Jul 2 07:53:41.127000 audit: BPF prog-id=174 op=UNLOAD Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { perfmon } for pid=4691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit[4691]: AVC avc: denied { bpf } for pid=4691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:41.127000 audit: BPF prog-id=176 op=LOAD Jul 2 07:53:41.127000 audit[4691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00022d638 items=0 ppid=4549 pid=4691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:41.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336566363665636535656634626432613131373732373438353362 Jul 2 07:53:41.190875 env[1736]: time="2024-07-02T07:53:41.190828879Z" level=info msg="StartContainer for \"c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258\" returns successfully" Jul 2 07:53:41.310860 kubelet[2812]: I0702 07:53:41.310780 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55cd76d879-4m94x" podStartSLOduration=29.259596286 podStartE2EDuration="33.310747233s" podCreationTimestamp="2024-07-02 07:53:08 +0000 UTC" firstStartedPulling="2024-07-02 07:53:36.835344918 +0000 UTC m=+50.286864665" lastFinishedPulling="2024-07-02 07:53:40.886495855 +0000 UTC m=+54.338015612" observedRunningTime="2024-07-02 07:53:41.310197624 +0000 UTC m=+54.761717394" watchObservedRunningTime="2024-07-02 07:53:41.310747233 +0000 UTC m=+54.762267005" Jul 2 07:53:42.019000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:42.019000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:42.019000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d317500 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:53:42.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:53:42.019000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00d903500 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:53:42.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:53:42.024000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:42.024000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00a35c4e0 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:53:42.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:53:42.024000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:42.024000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00d903590 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:53:42.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:53:42.025000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:42.025000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00d317620 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:53:42.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:53:42.036000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:42.036000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00a35c5e0 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:53:42.036000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:53:42.606919 env[1736]: time="2024-07-02T07:53:42.606849813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:42.610716 env[1736]: time="2024-07-02T07:53:42.610672148Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:42.613694 env[1736]: time="2024-07-02T07:53:42.613652036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:42.616034 env[1736]: time="2024-07-02T07:53:42.615988723Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:42.616376 env[1736]: time="2024-07-02T07:53:42.616336095Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:53:42.619845 env[1736]: time="2024-07-02T07:53:42.619809231Z" level=info msg="CreateContainer within sandbox \"584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:53:42.650300 env[1736]: time="2024-07-02T07:53:42.650248044Z" level=info msg="CreateContainer within sandbox \"584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4d5829ff7ef7e8d15fa4d231c4c58744a883c68dd401420ca814a262fa331e76\"" Jul 2 07:53:42.651233 env[1736]: time="2024-07-02T07:53:42.651194374Z" level=info msg="StartContainer for \"4d5829ff7ef7e8d15fa4d231c4c58744a883c68dd401420ca814a262fa331e76\"" Jul 2 07:53:42.689487 systemd[1]: Started cri-containerd-4d5829ff7ef7e8d15fa4d231c4c58744a883c68dd401420ca814a262fa331e76.scope. Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f635fef27c8 items=0 ppid=4345 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353832396666376566376538643135666134643233316334633538 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit: BPF prog-id=177 op=LOAD Jul 2 07:53:42.744000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002b7bc8 items=0 ppid=4345 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353832396666376566376538643135666134643233316334633538 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit: BPF prog-id=178 op=LOAD Jul 2 07:53:42.744000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002b7c18 items=0 ppid=4345 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353832396666376566376538643135666134643233316334633538 Jul 2 07:53:42.744000 audit: BPF prog-id=178 op=UNLOAD Jul 2 07:53:42.744000 audit: BPF prog-id=177 op=UNLOAD Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:42.744000 audit: BPF prog-id=179 op=LOAD Jul 2 07:53:42.744000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002b7ca8 items=0 ppid=4345 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353832396666376566376538643135666134643233316334633538 Jul 2 07:53:42.776502 env[1736]: time="2024-07-02T07:53:42.776449777Z" level=info msg="StartContainer for \"4d5829ff7ef7e8d15fa4d231c4c58744a883c68dd401420ca814a262fa331e76\" returns successfully" Jul 2 07:53:42.914537 systemd[1]: run-containerd-runc-k8s.io-4d5829ff7ef7e8d15fa4d231c4c58744a883c68dd401420ca814a262fa331e76-runc.SEBc78.mount: Deactivated successfully. Jul 2 07:53:43.092490 systemd[1]: Started sshd@8-172.31.20.226:22-139.178.89.65:54246.service. Jul 2 07:53:43.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.20.226:22-139.178.89.65:54246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.321000 audit[4785]: USER_ACCT pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:43.323000 audit[4785]: CRED_ACQ pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:43.325333 sshd[4785]: Accepted publickey for core from 139.178.89.65 port 54246 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:53:43.324000 audit[4785]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6cd79130 a2=3 a3=0 items=0 ppid=1 pid=4785 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:43.324000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:43.329949 sshd[4785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:43.341099 systemd[1]: Started session-9.scope. Jul 2 07:53:43.343218 systemd-logind[1726]: New session 9 of user core. Jul 2 07:53:43.352000 audit[4785]: USER_START pid=4785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:43.355000 audit[4788]: CRED_ACQ pid=4788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:43.372611 kubelet[2812]: I0702 07:53:43.372505 2812 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:53:43.372611 kubelet[2812]: I0702 07:53:43.372609 2812 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:53:43.865022 sshd[4785]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:43.865000 audit[4785]: USER_END pid=4785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:43.866000 audit[4785]: CRED_DISP pid=4785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:43.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.20.226:22-139.178.89.65:54246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:43.869634 systemd[1]: sshd@8-172.31.20.226:22-139.178.89.65:54246.service: Deactivated successfully. Jul 2 07:53:43.870964 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:53:43.872578 systemd-logind[1726]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:53:43.873961 systemd-logind[1726]: Removed session 9. Jul 2 07:53:46.994937 env[1736]: time="2024-07-02T07:53:46.994891483Z" level=info msg="StopPodSandbox for \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\"" Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.098 [WARNING][4815] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0", GenerateName:"calico-kube-controllers-55cd76d879-", Namespace:"calico-system", SelfLink:"", UID:"1c3254f3-a58e-4469-92ba-51f59dd14308", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55cd76d879", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8", Pod:"calico-kube-controllers-55cd76d879-4m94x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.84.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib9ce3fdd110", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.098 [INFO][4815] k8s.go 608: Cleaning up netns ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.098 [INFO][4815] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" iface="eth0" netns="" Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.099 [INFO][4815] k8s.go 615: Releasing IP address(es) ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.099 [INFO][4815] utils.go 188: Calico CNI releasing IP address ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.134 [INFO][4821] ipam_plugin.go 411: Releasing address using handleID ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.134 [INFO][4821] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.134 [INFO][4821] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.140 [WARNING][4821] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.140 [INFO][4821] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.142 [INFO][4821] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:47.147668 env[1736]: 2024-07-02 07:53:47.145 [INFO][4815] k8s.go 621: Teardown processing complete. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:47.147668 env[1736]: time="2024-07-02T07:53:47.147611585Z" level=info msg="TearDown network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\" successfully" Jul 2 07:53:47.147668 env[1736]: time="2024-07-02T07:53:47.147647778Z" level=info msg="StopPodSandbox for \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\" returns successfully" Jul 2 07:53:47.149202 env[1736]: time="2024-07-02T07:53:47.149170685Z" level=info msg="RemovePodSandbox for \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\"" Jul 2 07:53:47.149387 env[1736]: time="2024-07-02T07:53:47.149327652Z" level=info msg="Forcibly stopping sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\"" Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.207 [WARNING][4840] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0", GenerateName:"calico-kube-controllers-55cd76d879-", Namespace:"calico-system", SelfLink:"", UID:"1c3254f3-a58e-4469-92ba-51f59dd14308", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55cd76d879", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"16b924ee4289afe2539bfa99a35465ab0554da683caa5380b98b19a0a66e13e8", Pod:"calico-kube-controllers-55cd76d879-4m94x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.84.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib9ce3fdd110", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.207 [INFO][4840] k8s.go 608: Cleaning up netns ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.207 [INFO][4840] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" iface="eth0" netns="" Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.207 [INFO][4840] k8s.go 615: Releasing IP address(es) ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.207 [INFO][4840] utils.go 188: Calico CNI releasing IP address ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.232 [INFO][4847] ipam_plugin.go 411: Releasing address using handleID ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.232 [INFO][4847] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.232 [INFO][4847] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.239 [WARNING][4847] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.239 [INFO][4847] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" HandleID="k8s-pod-network.9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Workload="ip--172--31--20--226-k8s-calico--kube--controllers--55cd76d879--4m94x-eth0" Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.242 [INFO][4847] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:47.247133 env[1736]: 2024-07-02 07:53:47.244 [INFO][4840] k8s.go 621: Teardown processing complete. ContainerID="9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78" Jul 2 07:53:47.247133 env[1736]: time="2024-07-02T07:53:47.246173801Z" level=info msg="TearDown network for sandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\" successfully" Jul 2 07:53:47.251578 env[1736]: time="2024-07-02T07:53:47.251524122Z" level=info msg="RemovePodSandbox \"9b93201d1e3bf8ab7f22591ca8e1a826b892295b2adc5aa92052f03337a7cf78\" returns successfully" Jul 2 07:53:47.252547 env[1736]: time="2024-07-02T07:53:47.252322701Z" level=info msg="StopPodSandbox for \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\"" Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.296 [WARNING][4865] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b0fe9189-3a75-490d-8563-da840bc1e64a", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c", Pod:"csi-node-driver-xkmmj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliec1e069b5a0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.296 [INFO][4865] k8s.go 608: Cleaning up netns ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.296 [INFO][4865] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" iface="eth0" netns="" Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.296 [INFO][4865] k8s.go 615: Releasing IP address(es) ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.296 [INFO][4865] utils.go 188: Calico CNI releasing IP address ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.331 [INFO][4871] ipam_plugin.go 411: Releasing address using handleID ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.332 [INFO][4871] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.332 [INFO][4871] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.339 [WARNING][4871] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.339 [INFO][4871] ipam_plugin.go 439: Releasing address using workloadID ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.340 [INFO][4871] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:47.344626 env[1736]: 2024-07-02 07:53:47.342 [INFO][4865] k8s.go 621: Teardown processing complete. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:47.345183 env[1736]: time="2024-07-02T07:53:47.345145442Z" level=info msg="TearDown network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\" successfully" Jul 2 07:53:47.345283 env[1736]: time="2024-07-02T07:53:47.345265112Z" level=info msg="StopPodSandbox for \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\" returns successfully" Jul 2 07:53:47.346076 env[1736]: time="2024-07-02T07:53:47.346040283Z" level=info msg="RemovePodSandbox for \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\"" Jul 2 07:53:47.346204 env[1736]: time="2024-07-02T07:53:47.346128587Z" level=info msg="Forcibly stopping sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\"" Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.388 [WARNING][4890] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b0fe9189-3a75-490d-8563-da840bc1e64a", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"584b52ecbb93d8995e79848b733ce2bb539a4dfbbeddf5c2267c693dccaac89c", Pod:"csi-node-driver-xkmmj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliec1e069b5a0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.388 [INFO][4890] k8s.go 608: Cleaning up netns ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.388 [INFO][4890] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" iface="eth0" netns="" Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.388 [INFO][4890] k8s.go 615: Releasing IP address(es) ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.388 [INFO][4890] utils.go 188: Calico CNI releasing IP address ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.418 [INFO][4897] ipam_plugin.go 411: Releasing address using handleID ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.418 [INFO][4897] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.418 [INFO][4897] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.425 [WARNING][4897] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.425 [INFO][4897] ipam_plugin.go 439: Releasing address using workloadID ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" HandleID="k8s-pod-network.18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Workload="ip--172--31--20--226-k8s-csi--node--driver--xkmmj-eth0" Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.427 [INFO][4897] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:47.430527 env[1736]: 2024-07-02 07:53:47.428 [INFO][4890] k8s.go 621: Teardown processing complete. ContainerID="18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2" Jul 2 07:53:47.432075 env[1736]: time="2024-07-02T07:53:47.430577999Z" level=info msg="TearDown network for sandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\" successfully" Jul 2 07:53:47.435074 env[1736]: time="2024-07-02T07:53:47.435033462Z" level=info msg="RemovePodSandbox \"18c41e685247c6955f993c1918379b56cb7f72f98a637ace0f2cdb318641dbd2\" returns successfully" Jul 2 07:53:47.435881 env[1736]: time="2024-07-02T07:53:47.435839249Z" level=info msg="StopPodSandbox for \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\"" Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.481 [WARNING][4915] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"cd620bbe-2a99-4e15-abef-cc67615a20a4", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2", Pod:"coredns-7db6d8ff4d-5qmrm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.84.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d06b0bbeb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.481 [INFO][4915] k8s.go 608: Cleaning up netns ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.481 [INFO][4915] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" iface="eth0" netns="" Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.481 [INFO][4915] k8s.go 615: Releasing IP address(es) ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.481 [INFO][4915] utils.go 188: Calico CNI releasing IP address ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.524 [INFO][4922] ipam_plugin.go 411: Releasing address using handleID ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.525 [INFO][4922] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.525 [INFO][4922] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.533 [WARNING][4922] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.533 [INFO][4922] ipam_plugin.go 439: Releasing address using workloadID ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.535 [INFO][4922] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:47.540370 env[1736]: 2024-07-02 07:53:47.536 [INFO][4915] k8s.go 621: Teardown processing complete. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:47.540370 env[1736]: time="2024-07-02T07:53:47.538225627Z" level=info msg="TearDown network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\" successfully" Jul 2 07:53:47.540370 env[1736]: time="2024-07-02T07:53:47.538266477Z" level=info msg="StopPodSandbox for \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\" returns successfully" Jul 2 07:53:47.540370 env[1736]: time="2024-07-02T07:53:47.539237937Z" level=info msg="RemovePodSandbox for \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\"" Jul 2 07:53:47.540370 env[1736]: time="2024-07-02T07:53:47.539279827Z" level=info msg="Forcibly stopping sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\"" Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.672 [WARNING][4941] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"cd620bbe-2a99-4e15-abef-cc67615a20a4", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"f102da33bd8935582d9a0c5cd5aa0812063bfceb5acdf8c824e245abba426ca2", Pod:"coredns-7db6d8ff4d-5qmrm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.84.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d06b0bbeb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.673 [INFO][4941] k8s.go 608: Cleaning up netns ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.673 [INFO][4941] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" iface="eth0" netns="" Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.673 [INFO][4941] k8s.go 615: Releasing IP address(es) ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.673 [INFO][4941] utils.go 188: Calico CNI releasing IP address ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.697 [INFO][4949] ipam_plugin.go 411: Releasing address using handleID ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.697 [INFO][4949] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.698 [INFO][4949] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.705 [WARNING][4949] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.705 [INFO][4949] ipam_plugin.go 439: Releasing address using workloadID ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" HandleID="k8s-pod-network.6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--5qmrm-eth0" Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.706 [INFO][4949] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:47.709855 env[1736]: 2024-07-02 07:53:47.708 [INFO][4941] k8s.go 621: Teardown processing complete. ContainerID="6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2" Jul 2 07:53:47.711266 env[1736]: time="2024-07-02T07:53:47.709892106Z" level=info msg="TearDown network for sandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\" successfully" Jul 2 07:53:47.714532 env[1736]: time="2024-07-02T07:53:47.714480794Z" level=info msg="RemovePodSandbox \"6009c9a89b41c4270d62671e5ad822cc2edc0efb61f9b4f8d56dd97967d7f8f2\" returns successfully" Jul 2 07:53:47.715142 env[1736]: time="2024-07-02T07:53:47.715101349Z" level=info msg="StopPodSandbox for \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\"" Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.755 [WARNING][4968] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"70345e66-a66e-42cb-8f8d-910952041175", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2", Pod:"coredns-7db6d8ff4d-v4k4b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.84.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a9ccba7796", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.755 [INFO][4968] k8s.go 608: Cleaning up netns ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.755 [INFO][4968] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" iface="eth0" netns="" Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.755 [INFO][4968] k8s.go 615: Releasing IP address(es) ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.755 [INFO][4968] utils.go 188: Calico CNI releasing IP address ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.781 [INFO][4974] ipam_plugin.go 411: Releasing address using handleID ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.782 [INFO][4974] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.782 [INFO][4974] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.788 [WARNING][4974] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.788 [INFO][4974] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.790 [INFO][4974] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:47.795337 env[1736]: 2024-07-02 07:53:47.792 [INFO][4968] k8s.go 621: Teardown processing complete. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:47.795337 env[1736]: time="2024-07-02T07:53:47.794073139Z" level=info msg="TearDown network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\" successfully" Jul 2 07:53:47.795337 env[1736]: time="2024-07-02T07:53:47.794108471Z" level=info msg="StopPodSandbox for \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\" returns successfully" Jul 2 07:53:47.795337 env[1736]: time="2024-07-02T07:53:47.795244281Z" level=info msg="RemovePodSandbox for \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\"" Jul 2 07:53:47.796799 env[1736]: time="2024-07-02T07:53:47.795339946Z" level=info msg="Forcibly stopping sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\"" Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.844 [WARNING][4992] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"70345e66-a66e-42cb-8f8d-910952041175", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"85540fd554bf215d4e40f10f5e4b9331892a3884d5fac267e2fa33d1ce3efac2", Pod:"coredns-7db6d8ff4d-v4k4b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.84.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a9ccba7796", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.844 [INFO][4992] k8s.go 608: Cleaning up netns ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.844 [INFO][4992] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" iface="eth0" netns="" Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.844 [INFO][4992] k8s.go 615: Releasing IP address(es) ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.844 [INFO][4992] utils.go 188: Calico CNI releasing IP address ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.869 [INFO][4998] ipam_plugin.go 411: Releasing address using handleID ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.869 [INFO][4998] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.869 [INFO][4998] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.877 [WARNING][4998] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.877 [INFO][4998] ipam_plugin.go 439: Releasing address using workloadID ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" HandleID="k8s-pod-network.9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Workload="ip--172--31--20--226-k8s-coredns--7db6d8ff4d--v4k4b-eth0" Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.879 [INFO][4998] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:53:47.883541 env[1736]: 2024-07-02 07:53:47.881 [INFO][4992] k8s.go 621: Teardown processing complete. ContainerID="9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8" Jul 2 07:53:47.884234 env[1736]: time="2024-07-02T07:53:47.883572435Z" level=info msg="TearDown network for sandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\" successfully" Jul 2 07:53:47.888218 env[1736]: time="2024-07-02T07:53:47.888171523Z" level=info msg="RemovePodSandbox \"9747fda4517ca0ddd645fd2fbd7938ed86f3384d2b2ef77fcce10e28f7d936d8\" returns successfully" Jul 2 07:53:48.897171 systemd[1]: Started sshd@9-172.31.20.226:22-139.178.89.65:44984.service. Jul 2 07:53:48.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.20.226:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:48.918581 kernel: kauditd_printk_skb: 125 callbacks suppressed Jul 2 07:53:48.918807 kernel: audit: type=1130 audit(1719906828.896:1199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.20.226:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:49.118000 audit[5005]: USER_ACCT pid=5005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.126783 sshd[5005]: Accepted publickey for core from 139.178.89.65 port 44984 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:53:49.125000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.128196 sshd[5005]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:49.133114 kernel: audit: type=1101 audit(1719906829.118:1200): pid=5005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.133229 kernel: audit: type=1103 audit(1719906829.125:1201): pid=5005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.145310 kernel: audit: type=1006 audit(1719906829.125:1202): pid=5005 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 07:53:49.145513 kernel: audit: type=1300 audit(1719906829.125:1202): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff27821080 a2=3 a3=0 items=0 ppid=1 pid=5005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:49.125000 audit[5005]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff27821080 a2=3 a3=0 items=0 ppid=1 pid=5005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:49.142318 systemd[1]: Started session-10.scope. Jul 2 07:53:49.125000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:49.149802 kernel: audit: type=1327 audit(1719906829.125:1202): proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:49.144250 systemd-logind[1726]: New session 10 of user core. Jul 2 07:53:49.156000 audit[5005]: USER_START pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.167506 kernel: audit: type=1105 audit(1719906829.156:1203): pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.167681 kernel: audit: type=1103 audit(1719906829.163:1204): pid=5007 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.163000 audit[5007]: CRED_ACQ pid=5007 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.464004 sshd[5005]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:49.465000 audit[5005]: USER_END pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.474607 kernel: audit: type=1106 audit(1719906829.465:1205): pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.469615 systemd-logind[1726]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:53:49.472966 systemd[1]: sshd@9-172.31.20.226:22-139.178.89.65:44984.service: Deactivated successfully. Jul 2 07:53:49.474128 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:53:49.465000 audit[5005]: CRED_DISP pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.477030 systemd-logind[1726]: Removed session 10. Jul 2 07:53:49.481578 kernel: audit: type=1104 audit(1719906829.465:1206): pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.20.226:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:49.490166 systemd[1]: Started sshd@10-172.31.20.226:22-139.178.89.65:45000.service. Jul 2 07:53:49.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.20.226:22-139.178.89.65:45000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:49.662000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.664490 sshd[5017]: Accepted publickey for core from 139.178.89.65 port 45000 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:53:49.664000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.664000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb8bd0e50 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:49.664000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:49.666427 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:49.673231 systemd[1]: Started session-11.scope. Jul 2 07:53:49.674567 systemd-logind[1726]: New session 11 of user core. Jul 2 07:53:49.680000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.682000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.959858 sshd[5017]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:49.960000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.960000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:49.964545 systemd[1]: sshd@10-172.31.20.226:22-139.178.89.65:45000.service: Deactivated successfully. Jul 2 07:53:49.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.20.226:22-139.178.89.65:45000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:49.967688 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:53:49.969321 systemd-logind[1726]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:53:49.970856 systemd-logind[1726]: Removed session 11. Jul 2 07:53:49.988467 systemd[1]: Started sshd@11-172.31.20.226:22-139.178.89.65:45006.service. Jul 2 07:53:49.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.20.226:22-139.178.89.65:45006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:50.157000 audit[5027]: USER_ACCT pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:50.159371 sshd[5027]: Accepted publickey for core from 139.178.89.65 port 45006 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:53:50.159000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:50.159000 audit[5027]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff861c5810 a2=3 a3=0 items=0 ppid=1 pid=5027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:50.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:50.161183 sshd[5027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:50.167609 systemd[1]: Started session-12.scope. Jul 2 07:53:50.168275 systemd-logind[1726]: New session 12 of user core. Jul 2 07:53:50.175000 audit[5027]: USER_START pid=5027 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:50.179000 audit[5029]: CRED_ACQ pid=5029 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:50.360630 systemd[1]: run-containerd-runc-k8s.io-c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258-runc.RDCtYR.mount: Deactivated successfully. Jul 2 07:53:50.459363 sshd[5027]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:50.459000 audit[5027]: USER_END pid=5027 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:50.459000 audit[5027]: CRED_DISP pid=5027 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:50.463597 systemd[1]: sshd@11-172.31.20.226:22-139.178.89.65:45006.service: Deactivated successfully. Jul 2 07:53:50.464808 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:53:50.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.20.226:22-139.178.89.65:45006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:50.465732 systemd-logind[1726]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:53:50.466907 systemd-logind[1726]: Removed session 12. Jul 2 07:53:55.487464 systemd[1]: Started sshd@12-172.31.20.226:22-139.178.89.65:45008.service. Jul 2 07:53:55.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.20.226:22-139.178.89.65:45008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:55.489280 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:53:55.489345 kernel: audit: type=1130 audit(1719906835.486:1226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.20.226:22-139.178.89.65:45008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:55.657000 audit[5069]: USER_ACCT pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.665262 sshd[5069]: Accepted publickey for core from 139.178.89.65 port 45008 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:53:55.665854 kernel: audit: type=1101 audit(1719906835.657:1227): pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.663000 audit[5069]: CRED_ACQ pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.667081 sshd[5069]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:55.676902 kernel: audit: type=1103 audit(1719906835.663:1228): pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.677043 kernel: audit: type=1006 audit(1719906835.664:1229): pid=5069 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 2 07:53:55.677096 kernel: audit: type=1300 audit(1719906835.664:1229): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd44a13d50 a2=3 a3=0 items=0 ppid=1 pid=5069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:55.664000 audit[5069]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd44a13d50 a2=3 a3=0 items=0 ppid=1 pid=5069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:55.676249 systemd[1]: Started session-13.scope. Jul 2 07:53:55.678048 systemd-logind[1726]: New session 13 of user core. Jul 2 07:53:55.664000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:55.686500 kernel: audit: type=1327 audit(1719906835.664:1229): proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:55.687000 audit[5069]: USER_START pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.694000 audit[5071]: CRED_ACQ pid=5071 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.701229 kernel: audit: type=1105 audit(1719906835.687:1230): pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.701350 kernel: audit: type=1103 audit(1719906835.694:1231): pid=5071 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.783077 systemd[1]: run-containerd-runc-k8s.io-c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258-runc.h4fhTb.mount: Deactivated successfully. Jul 2 07:53:55.921080 sshd[5069]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:55.924000 audit[5069]: USER_END pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.928767 systemd[1]: sshd@12-172.31.20.226:22-139.178.89.65:45008.service: Deactivated successfully. Jul 2 07:53:55.929944 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:53:55.925000 audit[5069]: CRED_DISP pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.932886 systemd-logind[1726]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:53:55.934786 systemd-logind[1726]: Removed session 13. Jul 2 07:53:55.938901 kernel: audit: type=1106 audit(1719906835.924:1232): pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.939027 kernel: audit: type=1104 audit(1719906835.925:1233): pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:53:55.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.20.226:22-139.178.89.65:45008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:56.532000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:56.532000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001eb8c40 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:53:56.532000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:56.542000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:56.542000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001eb8c60 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:53:56.542000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:56.542000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:56.542000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001dc34c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:53:56.542000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:56.542000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:56.542000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001eb8c80 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:53:56.542000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:00.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.20.226:22-139.178.89.65:38572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:00.963335 systemd[1]: Started sshd@13-172.31.20.226:22-139.178.89.65:38572.service. Jul 2 07:54:00.967089 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:54:00.967139 kernel: audit: type=1130 audit(1719906840.962:1239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.20.226:22-139.178.89.65:38572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:01.184000 audit[5107]: USER_ACCT pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.187181 sshd[5107]: Accepted publickey for core from 139.178.89.65 port 38572 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:01.196483 kernel: audit: type=1101 audit(1719906841.184:1240): pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.195000 audit[5107]: CRED_ACQ pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.199708 sshd[5107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:01.206670 kernel: audit: type=1103 audit(1719906841.195:1241): pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.198000 audit[5107]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe443699f0 a2=3 a3=0 items=0 ppid=1 pid=5107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:01.216188 systemd[1]: Started session-14.scope. Jul 2 07:54:01.220282 kernel: audit: type=1006 audit(1719906841.198:1242): pid=5107 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 2 07:54:01.220411 kernel: audit: type=1300 audit(1719906841.198:1242): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe443699f0 a2=3 a3=0 items=0 ppid=1 pid=5107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:01.220568 systemd-logind[1726]: New session 14 of user core. Jul 2 07:54:01.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:01.224487 kernel: audit: type=1327 audit(1719906841.198:1242): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:01.229000 audit[5107]: USER_START pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.244492 kernel: audit: type=1105 audit(1719906841.229:1243): pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.244671 kernel: audit: type=1103 audit(1719906841.237:1244): pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.237000 audit[5109]: CRED_ACQ pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.504152 sshd[5107]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:01.504000 audit[5107]: USER_END pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.513479 kernel: audit: type=1106 audit(1719906841.504:1245): pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.513720 systemd[1]: sshd@13-172.31.20.226:22-139.178.89.65:38572.service: Deactivated successfully. Jul 2 07:54:01.514788 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:54:01.504000 audit[5107]: CRED_DISP pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:01.515916 systemd-logind[1726]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:54:01.518088 systemd-logind[1726]: Removed session 14. Jul 2 07:54:01.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.20.226:22-139.178.89.65:38572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:01.522477 kernel: audit: type=1104 audit(1719906841.504:1246): pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.530493 systemd[1]: Started sshd@14-172.31.20.226:22-139.178.89.65:38584.service. Jul 2 07:54:06.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.20.226:22-139.178.89.65:38584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.532326 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:54:06.532566 kernel: audit: type=1130 audit(1719906846.529:1248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.20.226:22-139.178.89.65:38584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.691000 audit[5125]: USER_ACCT pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.693523 sshd[5125]: Accepted publickey for core from 139.178.89.65 port 38584 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:06.699574 kernel: audit: type=1101 audit(1719906846.691:1249): pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.698000 audit[5125]: CRED_ACQ pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.700901 sshd[5125]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:06.706521 kernel: audit: type=1103 audit(1719906846.698:1250): pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.698000 audit[5125]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5d3500d0 a2=3 a3=0 items=0 ppid=1 pid=5125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:06.711898 systemd[1]: Started session-15.scope. Jul 2 07:54:06.714700 systemd-logind[1726]: New session 15 of user core. Jul 2 07:54:06.717377 kernel: audit: type=1006 audit(1719906846.698:1251): pid=5125 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 2 07:54:06.717463 kernel: audit: type=1300 audit(1719906846.698:1251): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5d3500d0 a2=3 a3=0 items=0 ppid=1 pid=5125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:06.717515 kernel: audit: type=1327 audit(1719906846.698:1251): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:06.698000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:06.724000 audit[5125]: USER_START pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.728000 audit[5127]: CRED_ACQ pid=5127 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.742252 kernel: audit: type=1105 audit(1719906846.724:1252): pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.742389 kernel: audit: type=1103 audit(1719906846.728:1253): pid=5127 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.938075 sshd[5125]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:06.938000 audit[5125]: USER_END pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.942268 systemd[1]: sshd@14-172.31.20.226:22-139.178.89.65:38584.service: Deactivated successfully. Jul 2 07:54:06.943603 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:54:06.946563 systemd-logind[1726]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:54:06.947527 kernel: audit: type=1106 audit(1719906846.938:1254): pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.938000 audit[5125]: CRED_DISP pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:06.948306 systemd-logind[1726]: Removed session 15. Jul 2 07:54:06.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.20.226:22-139.178.89.65:38584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.954203 kernel: audit: type=1104 audit(1719906846.938:1255): pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:08.008711 systemd[1]: run-containerd-runc-k8s.io-f21a1d472bffb8317a19f61889276a16210ca62b2df6debc8b09441aaf41c507-runc.NZI8lX.mount: Deactivated successfully. Jul 2 07:54:11.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.20.226:22-139.178.89.65:49208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:11.971708 systemd[1]: Started sshd@15-172.31.20.226:22-139.178.89.65:49208.service. Jul 2 07:54:11.975928 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:54:11.976012 kernel: audit: type=1130 audit(1719906851.970:1257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.20.226:22-139.178.89.65:49208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:12.185000 audit[5166]: USER_ACCT pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.188939 sshd[5166]: Accepted publickey for core from 139.178.89.65 port 49208 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:12.193531 kernel: audit: type=1101 audit(1719906852.185:1258): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.193650 kernel: audit: type=1103 audit(1719906852.191:1259): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.191000 audit[5166]: CRED_ACQ pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.195727 sshd[5166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:12.204329 systemd[1]: Started session-16.scope. Jul 2 07:54:12.205568 systemd-logind[1726]: New session 16 of user core. Jul 2 07:54:12.208429 kernel: audit: type=1006 audit(1719906852.192:1260): pid=5166 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 07:54:12.192000 audit[5166]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff44eb6950 a2=3 a3=0 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:12.218622 kernel: audit: type=1300 audit(1719906852.192:1260): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff44eb6950 a2=3 a3=0 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:12.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:12.222508 kernel: audit: type=1327 audit(1719906852.192:1260): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:12.216000 audit[5166]: USER_START pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.236468 kernel: audit: type=1105 audit(1719906852.216:1261): pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.219000 audit[5168]: CRED_ACQ pid=5168 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.244462 kernel: audit: type=1103 audit(1719906852.219:1262): pid=5168 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.598361 sshd[5166]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:12.598000 audit[5166]: USER_END pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.608480 kernel: audit: type=1106 audit(1719906852.598:1263): pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.598000 audit[5166]: CRED_DISP pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.613109 systemd[1]: sshd@15-172.31.20.226:22-139.178.89.65:49208.service: Deactivated successfully. Jul 2 07:54:12.615731 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 07:54:12.616274 systemd-logind[1726]: Session 16 logged out. Waiting for processes to exit. Jul 2 07:54:12.617494 kernel: audit: type=1104 audit(1719906852.598:1264): pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.20.226:22-139.178.89.65:49208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:12.618963 systemd-logind[1726]: Removed session 16. Jul 2 07:54:12.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.20.226:22-139.178.89.65:49216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:12.628062 systemd[1]: Started sshd@16-172.31.20.226:22-139.178.89.65:49216.service. Jul 2 07:54:12.803000 audit[5178]: USER_ACCT pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.805542 sshd[5178]: Accepted publickey for core from 139.178.89.65 port 49216 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:12.806000 audit[5178]: CRED_ACQ pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.806000 audit[5178]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff11e968e0 a2=3 a3=0 items=0 ppid=1 pid=5178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:12.806000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:12.808162 sshd[5178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:12.816578 systemd-logind[1726]: New session 17 of user core. Jul 2 07:54:12.817359 systemd[1]: Started session-17.scope. Jul 2 07:54:12.824000 audit[5178]: USER_START pid=5178 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:12.827000 audit[5180]: CRED_ACQ pid=5180 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:13.167104 kubelet[2812]: I0702 07:54:13.167026 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xkmmj" podStartSLOduration=58.498123812 podStartE2EDuration="1m5.167000963s" podCreationTimestamp="2024-07-02 07:53:08 +0000 UTC" firstStartedPulling="2024-07-02 07:53:35.949060729 +0000 UTC m=+49.400580490" lastFinishedPulling="2024-07-02 07:53:42.617937888 +0000 UTC m=+56.069457641" observedRunningTime="2024-07-02 07:53:43.340418401 +0000 UTC m=+56.791938171" watchObservedRunningTime="2024-07-02 07:54:13.167000963 +0000 UTC m=+86.618520734" Jul 2 07:54:13.180968 kubelet[2812]: I0702 07:54:13.178335 2812 topology_manager.go:215] "Topology Admit Handler" podUID="73019c92-3ca6-43bb-a43d-f5e664770abf" podNamespace="calico-apiserver" podName="calico-apiserver-6b7c98db78-m9kml" Jul 2 07:54:13.203941 systemd[1]: Created slice kubepods-besteffort-pod73019c92_3ca6_43bb_a43d_f5e664770abf.slice. Jul 2 07:54:13.215779 kubelet[2812]: I0702 07:54:13.215741 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/73019c92-3ca6-43bb-a43d-f5e664770abf-calico-apiserver-certs\") pod \"calico-apiserver-6b7c98db78-m9kml\" (UID: \"73019c92-3ca6-43bb-a43d-f5e664770abf\") " pod="calico-apiserver/calico-apiserver-6b7c98db78-m9kml" Jul 2 07:54:13.216356 kubelet[2812]: I0702 07:54:13.216320 2812 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7bztw\" (UniqueName: \"kubernetes.io/projected/73019c92-3ca6-43bb-a43d-f5e664770abf-kube-api-access-7bztw\") pod \"calico-apiserver-6b7c98db78-m9kml\" (UID: \"73019c92-3ca6-43bb-a43d-f5e664770abf\") " pod="calico-apiserver/calico-apiserver-6b7c98db78-m9kml" Jul 2 07:54:13.213000 audit[5186]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=5186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:13.213000 audit[5186]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffce1f82a60 a2=0 a3=7ffce1f82a4c items=0 ppid=3061 pid=5186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:13.218000 audit[5186]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=5186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:13.218000 audit[5186]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffce1f82a60 a2=0 a3=7ffce1f82a4c items=0 ppid=3061 pid=5186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:13.249000 audit[5188]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:13.249000 audit[5188]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffebb009cd0 a2=0 a3=7ffebb009cbc items=0 ppid=3061 pid=5188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:13.252000 audit[5188]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:13.252000 audit[5188]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffebb009cd0 a2=0 a3=7ffebb009cbc items=0 ppid=3061 pid=5188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:13.318530 kubelet[2812]: E0702 07:54:13.318431 2812 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:54:13.318807 kubelet[2812]: E0702 07:54:13.318628 2812 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/73019c92-3ca6-43bb-a43d-f5e664770abf-calico-apiserver-certs podName:73019c92-3ca6-43bb-a43d-f5e664770abf nodeName:}" failed. No retries permitted until 2024-07-02 07:54:13.818603074 +0000 UTC m=+87.270122838 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/73019c92-3ca6-43bb-a43d-f5e664770abf-calico-apiserver-certs") pod "calico-apiserver-6b7c98db78-m9kml" (UID: "73019c92-3ca6-43bb-a43d-f5e664770abf") : secret "calico-apiserver-certs" not found Jul 2 07:54:13.678199 sshd[5178]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:13.679000 audit[5178]: USER_END pid=5178 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:13.680000 audit[5178]: CRED_DISP pid=5178 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:13.692729 systemd[1]: sshd@16-172.31.20.226:22-139.178.89.65:49216.service: Deactivated successfully. Jul 2 07:54:13.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.20.226:22-139.178.89.65:49216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.693759 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 07:54:13.694396 systemd-logind[1726]: Session 17 logged out. Waiting for processes to exit. Jul 2 07:54:13.695475 systemd-logind[1726]: Removed session 17. Jul 2 07:54:13.702575 systemd[1]: Started sshd@17-172.31.20.226:22-139.178.89.65:49222.service. Jul 2 07:54:13.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.20.226:22-139.178.89.65:49222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:13.821017 kubelet[2812]: E0702 07:54:13.820944 2812 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:54:13.821661 kubelet[2812]: E0702 07:54:13.821107 2812 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/73019c92-3ca6-43bb-a43d-f5e664770abf-calico-apiserver-certs podName:73019c92-3ca6-43bb-a43d-f5e664770abf nodeName:}" failed. No retries permitted until 2024-07-02 07:54:14.821044886 +0000 UTC m=+88.272564637 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/73019c92-3ca6-43bb-a43d-f5e664770abf-calico-apiserver-certs") pod "calico-apiserver-6b7c98db78-m9kml" (UID: "73019c92-3ca6-43bb-a43d-f5e664770abf") : secret "calico-apiserver-certs" not found Jul 2 07:54:13.886708 sshd[5198]: Accepted publickey for core from 139.178.89.65 port 49222 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:13.885000 audit[5198]: USER_ACCT pid=5198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:13.886000 audit[5198]: CRED_ACQ pid=5198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:13.886000 audit[5198]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9e247d50 a2=3 a3=0 items=0 ppid=1 pid=5198 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.886000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:13.889594 sshd[5198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:13.897177 systemd-logind[1726]: New session 18 of user core. Jul 2 07:54:13.898835 systemd[1]: Started session-18.scope. Jul 2 07:54:13.906000 audit[5198]: USER_START pid=5198 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:13.909000 audit[5200]: CRED_ACQ pid=5200 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:15.015583 env[1736]: time="2024-07-02T07:54:15.014986180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b7c98db78-m9kml,Uid:73019c92-3ca6-43bb-a43d-f5e664770abf,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:54:15.400862 (udev-worker)[5226]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:54:15.407270 systemd-networkd[1461]: cali6262f6226a1: Link UP Jul 2 07:54:15.412484 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:54:15.412607 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6262f6226a1: link becomes ready Jul 2 07:54:15.412475 systemd-networkd[1461]: cali6262f6226a1: Gained carrier Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.212 [INFO][5210] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0 calico-apiserver-6b7c98db78- calico-apiserver 73019c92-3ca6-43bb-a43d-f5e664770abf 1038 0 2024-07-02 07:54:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b7c98db78 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-20-226 calico-apiserver-6b7c98db78-m9kml eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6262f6226a1 [] []}} ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Namespace="calico-apiserver" Pod="calico-apiserver-6b7c98db78-m9kml" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.212 [INFO][5210] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Namespace="calico-apiserver" Pod="calico-apiserver-6b7c98db78-m9kml" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.276 [INFO][5220] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" HandleID="k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Workload="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.297 [INFO][5220] ipam_plugin.go 264: Auto assigning IP ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" HandleID="k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Workload="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002882f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-20-226", "pod":"calico-apiserver-6b7c98db78-m9kml", "timestamp":"2024-07-02 07:54:15.276679595 +0000 UTC"}, Hostname:"ip-172-31-20-226", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.298 [INFO][5220] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.298 [INFO][5220] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.298 [INFO][5220] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-20-226' Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.300 [INFO][5220] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.317 [INFO][5220] ipam.go 372: Looking up existing affinities for host host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.327 [INFO][5220] ipam.go 489: Trying affinity for 192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.331 [INFO][5220] ipam.go 155: Attempting to load block cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.335 [INFO][5220] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.84.0/26 host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.335 [INFO][5220] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.84.0/26 handle="k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.337 [INFO][5220] ipam.go 1685: Creating new handle: k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965 Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.343 [INFO][5220] ipam.go 1203: Writing block in order to claim IPs block=192.168.84.0/26 handle="k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.386 [INFO][5220] ipam.go 1216: Successfully claimed IPs: [192.168.84.5/26] block=192.168.84.0/26 handle="k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.386 [INFO][5220] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.84.5/26] handle="k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" host="ip-172-31-20-226" Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.387 [INFO][5220] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:15.443607 env[1736]: 2024-07-02 07:54:15.387 [INFO][5220] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.84.5/26] IPv6=[] ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" HandleID="k8s-pod-network.bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Workload="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" Jul 2 07:54:15.445544 env[1736]: 2024-07-02 07:54:15.390 [INFO][5210] k8s.go 386: Populated endpoint ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Namespace="calico-apiserver" Pod="calico-apiserver-6b7c98db78-m9kml" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0", GenerateName:"calico-apiserver-6b7c98db78-", Namespace:"calico-apiserver", SelfLink:"", UID:"73019c92-3ca6-43bb-a43d-f5e664770abf", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b7c98db78", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"", Pod:"calico-apiserver-6b7c98db78-m9kml", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.84.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6262f6226a1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:15.445544 env[1736]: 2024-07-02 07:54:15.395 [INFO][5210] k8s.go 387: Calico CNI using IPs: [192.168.84.5/32] ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Namespace="calico-apiserver" Pod="calico-apiserver-6b7c98db78-m9kml" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" Jul 2 07:54:15.445544 env[1736]: 2024-07-02 07:54:15.395 [INFO][5210] dataplane_linux.go 68: Setting the host side veth name to cali6262f6226a1 ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Namespace="calico-apiserver" Pod="calico-apiserver-6b7c98db78-m9kml" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" Jul 2 07:54:15.445544 env[1736]: 2024-07-02 07:54:15.413 [INFO][5210] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Namespace="calico-apiserver" Pod="calico-apiserver-6b7c98db78-m9kml" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" Jul 2 07:54:15.445544 env[1736]: 2024-07-02 07:54:15.414 [INFO][5210] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Namespace="calico-apiserver" Pod="calico-apiserver-6b7c98db78-m9kml" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0", GenerateName:"calico-apiserver-6b7c98db78-", Namespace:"calico-apiserver", SelfLink:"", UID:"73019c92-3ca6-43bb-a43d-f5e664770abf", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b7c98db78", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-20-226", ContainerID:"bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965", Pod:"calico-apiserver-6b7c98db78-m9kml", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.84.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6262f6226a1", MAC:"5e:f2:5d:5c:c8:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:15.445544 env[1736]: 2024-07-02 07:54:15.441 [INFO][5210] k8s.go 500: Wrote updated endpoint to datastore ContainerID="bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965" Namespace="calico-apiserver" Pod="calico-apiserver-6b7c98db78-m9kml" WorkloadEndpoint="ip--172--31--20--226-k8s-calico--apiserver--6b7c98db78--m9kml-eth0" Jul 2 07:54:15.470818 env[1736]: time="2024-07-02T07:54:15.470710920Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:15.470818 env[1736]: time="2024-07-02T07:54:15.470770982Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:15.471115 env[1736]: time="2024-07-02T07:54:15.470811105Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:15.471357 env[1736]: time="2024-07-02T07:54:15.471289990Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965 pid=5244 runtime=io.containerd.runc.v2 Jul 2 07:54:15.497171 systemd[1]: Started cri-containerd-bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965.scope. Jul 2 07:54:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.544000 audit: BPF prog-id=180 op=LOAD Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=5244 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313265633532373335343735383062356436616566633939646432 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=5244 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313265633532373335343735383062356436616566633939646432 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit: BPF prog-id=181 op=LOAD Jul 2 07:54:15.545000 audit[5255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e1a30 items=0 ppid=5244 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313265633532373335343735383062356436616566633939646432 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit: BPF prog-id=182 op=LOAD Jul 2 07:54:15.545000 audit[5255]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e1a78 items=0 ppid=5244 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313265633532373335343735383062356436616566633939646432 Jul 2 07:54:15.545000 audit: BPF prog-id=182 op=UNLOAD Jul 2 07:54:15.545000 audit: BPF prog-id=181 op=UNLOAD Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { perfmon } for pid=5255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit[5255]: AVC avc: denied { bpf } for pid=5255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:15.545000 audit: BPF prog-id=183 op=LOAD Jul 2 07:54:15.545000 audit[5255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e1e88 items=0 ppid=5244 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313265633532373335343735383062356436616566633939646432 Jul 2 07:54:15.632710 env[1736]: time="2024-07-02T07:54:15.632663582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b7c98db78-m9kml,Uid:73019c92-3ca6-43bb-a43d-f5e664770abf,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965\"" Jul 2 07:54:15.639292 env[1736]: time="2024-07-02T07:54:15.639247329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:54:15.784000 audit[5279]: NETFILTER_CFG table=filter:115 family=2 entries=51 op=nft_register_chain pid=5279 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:15.784000 audit[5279]: SYSCALL arch=c000003e syscall=46 success=yes exit=26260 a0=3 a1=7ffe36ff0080 a2=0 a3=7ffe36ff006c items=0 ppid=3936 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:15.784000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:16.453706 systemd-networkd[1461]: cali6262f6226a1: Gained IPv6LL Jul 2 07:54:16.900000 audit[5282]: NETFILTER_CFG table=filter:116 family=2 entries=22 op=nft_register_rule pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:16.900000 audit[5282]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffdf391a090 a2=0 a3=7ffdf391a07c items=0 ppid=3061 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:16.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:16.912000 audit[5282]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:16.912000 audit[5282]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf391a090 a2=0 a3=0 items=0 ppid=3061 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:16.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:16.928000 audit[5284]: NETFILTER_CFG table=filter:118 family=2 entries=34 op=nft_register_rule pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:16.928000 audit[5284]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fffce910aa0 a2=0 a3=7fffce910a8c items=0 ppid=3061 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:16.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:16.932000 audit[5284]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:16.932000 audit[5284]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffce910aa0 a2=0 a3=0 items=0 ppid=3061 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:16.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:16.962560 sshd[5198]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:16.963000 audit[5198]: USER_END pid=5198 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:16.963000 audit[5198]: CRED_DISP pid=5198 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:16.981175 systemd-logind[1726]: Session 18 logged out. Waiting for processes to exit. Jul 2 07:54:16.983460 systemd[1]: sshd@17-172.31.20.226:22-139.178.89.65:49222.service: Deactivated successfully. Jul 2 07:54:16.991978 kernel: kauditd_printk_skb: 106 callbacks suppressed Jul 2 07:54:16.992148 kernel: audit: type=1131 audit(1719906856.982:1310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.20.226:22-139.178.89.65:49222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:16.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.20.226:22-139.178.89.65:49222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:16.984774 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 07:54:16.998511 systemd[1]: Started sshd@18-172.31.20.226:22-139.178.89.65:49234.service. Jul 2 07:54:17.010953 kernel: audit: type=1130 audit(1719906856.997:1311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.20.226:22-139.178.89.65:49234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:16.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.20.226:22-139.178.89.65:49234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:17.004948 systemd-logind[1726]: Removed session 18. Jul 2 07:54:17.185000 audit[5287]: USER_ACCT pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:17.192926 sshd[5287]: Accepted publickey for core from 139.178.89.65 port 49234 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:17.193456 kernel: audit: type=1101 audit(1719906857.185:1312): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:17.191000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:17.200141 sshd[5287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:17.201801 kernel: audit: type=1103 audit(1719906857.191:1313): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:17.207809 kernel: audit: type=1006 audit(1719906857.191:1314): pid=5287 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Jul 2 07:54:17.213428 systemd[1]: Started session-19.scope. Jul 2 07:54:17.191000 audit[5287]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd08d38490 a2=3 a3=0 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:17.215994 systemd-logind[1726]: New session 19 of user core. Jul 2 07:54:17.221475 kernel: audit: type=1300 audit(1719906857.191:1314): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd08d38490 a2=3 a3=0 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:17.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:17.225499 kernel: audit: type=1327 audit(1719906857.191:1314): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:17.226000 audit[5287]: USER_START pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:17.242802 kernel: audit: type=1105 audit(1719906857.226:1315): pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:17.242882 kernel: audit: type=1103 audit(1719906857.227:1316): pid=5289 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:17.227000 audit[5289]: CRED_ACQ pid=5289 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:18.758964 sshd[5287]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:18.771003 kernel: audit: type=1106 audit(1719906858.759:1317): pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:18.759000 audit[5287]: USER_END pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:18.765757 systemd-logind[1726]: Session 19 logged out. Waiting for processes to exit. Jul 2 07:54:18.767627 systemd[1]: sshd@18-172.31.20.226:22-139.178.89.65:49234.service: Deactivated successfully. Jul 2 07:54:18.759000 audit[5287]: CRED_DISP pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:18.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.20.226:22-139.178.89.65:49234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:18.768994 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 07:54:18.775583 systemd-logind[1726]: Removed session 19. Jul 2 07:54:18.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.20.226:22-139.178.89.65:47730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:18.787995 systemd[1]: Started sshd@19-172.31.20.226:22-139.178.89.65:47730.service. Jul 2 07:54:19.019000 audit[5297]: USER_ACCT pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:19.021950 sshd[5297]: Accepted publickey for core from 139.178.89.65 port 47730 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:19.023000 audit[5297]: CRED_ACQ pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:19.023000 audit[5297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd22f73b30 a2=3 a3=0 items=0 ppid=1 pid=5297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:19.023000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:19.027371 sshd[5297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:19.037521 systemd-logind[1726]: New session 20 of user core. Jul 2 07:54:19.038658 systemd[1]: Started session-20.scope. Jul 2 07:54:19.052000 audit[5297]: USER_START pid=5297 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:19.054000 audit[5299]: CRED_ACQ pid=5299 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:19.454407 sshd[5297]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:19.454000 audit[5297]: USER_END pid=5297 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:19.455000 audit[5297]: CRED_DISP pid=5297 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:19.458661 systemd[1]: sshd@19-172.31.20.226:22-139.178.89.65:47730.service: Deactivated successfully. Jul 2 07:54:19.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.20.226:22-139.178.89.65:47730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:19.459742 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 07:54:19.461592 systemd-logind[1726]: Session 20 logged out. Waiting for processes to exit. Jul 2 07:54:19.463090 systemd-logind[1726]: Removed session 20. Jul 2 07:54:19.815000 audit[5308]: NETFILTER_CFG table=filter:120 family=2 entries=34 op=nft_register_rule pid=5308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:19.815000 audit[5308]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff8f438fe0 a2=0 a3=7fff8f438fcc items=0 ppid=3061 pid=5308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:19.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:19.818000 audit[5308]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=5308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:19.818000 audit[5308]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff8f438fe0 a2=0 a3=0 items=0 ppid=3061 pid=5308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:19.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:19.984481 env[1736]: time="2024-07-02T07:54:19.981647000Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:19.985070 env[1736]: time="2024-07-02T07:54:19.985034338Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:19.988312 env[1736]: time="2024-07-02T07:54:19.988253020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:19.990680 env[1736]: time="2024-07-02T07:54:19.990629971Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:19.992911 env[1736]: time="2024-07-02T07:54:19.992869036Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:54:20.146733 env[1736]: time="2024-07-02T07:54:20.146580059Z" level=info msg="CreateContainer within sandbox \"bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:54:20.170589 env[1736]: time="2024-07-02T07:54:20.170524252Z" level=info msg="CreateContainer within sandbox \"bd12ec5273547580b5d6aefc99dd214c1b981bd0420a851ace24102fb2951965\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3696ea628c706ce8eeae40b6dbde81ff5824f70619bb3df4585a307dda98fbb9\"" Jul 2 07:54:20.171222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount211473476.mount: Deactivated successfully. Jul 2 07:54:20.172252 env[1736]: time="2024-07-02T07:54:20.172212298Z" level=info msg="StartContainer for \"3696ea628c706ce8eeae40b6dbde81ff5824f70619bb3df4585a307dda98fbb9\"" Jul 2 07:54:20.218103 systemd[1]: Started cri-containerd-3696ea628c706ce8eeae40b6dbde81ff5824f70619bb3df4585a307dda98fbb9.scope. Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.267000 audit: BPF prog-id=184 op=LOAD Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5244 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:20.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393665613632386337303663653865656165343062366462646538 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=5244 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:20.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393665613632386337303663653865656165343062366462646538 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit: BPF prog-id=185 op=LOAD Jul 2 07:54:20.268000 audit[5315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00034bd00 items=0 ppid=5244 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:20.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393665613632386337303663653865656165343062366462646538 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit: BPF prog-id=186 op=LOAD Jul 2 07:54:20.268000 audit[5315]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00034bd48 items=0 ppid=5244 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:20.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393665613632386337303663653865656165343062366462646538 Jul 2 07:54:20.268000 audit: BPF prog-id=186 op=UNLOAD Jul 2 07:54:20.268000 audit: BPF prog-id=185 op=UNLOAD Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { perfmon } for pid=5315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit[5315]: AVC avc: denied { bpf } for pid=5315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:20.268000 audit: BPF prog-id=187 op=LOAD Jul 2 07:54:20.268000 audit[5315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b6158 items=0 ppid=5244 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:20.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393665613632386337303663653865656165343062366462646538 Jul 2 07:54:20.342267 env[1736]: time="2024-07-02T07:54:20.342099024Z" level=info msg="StartContainer for \"3696ea628c706ce8eeae40b6dbde81ff5824f70619bb3df4585a307dda98fbb9\" returns successfully" Jul 2 07:54:20.559965 kubelet[2812]: I0702 07:54:20.556717 2812 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b7c98db78-m9kml" podStartSLOduration=3.178205265 podStartE2EDuration="7.541691211s" podCreationTimestamp="2024-07-02 07:54:13 +0000 UTC" firstStartedPulling="2024-07-02 07:54:15.636476915 +0000 UTC m=+89.087996677" lastFinishedPulling="2024-07-02 07:54:19.999962857 +0000 UTC m=+93.451482623" observedRunningTime="2024-07-02 07:54:20.528327587 +0000 UTC m=+93.979847356" watchObservedRunningTime="2024-07-02 07:54:20.541691211 +0000 UTC m=+93.993210984" Jul 2 07:54:20.615000 audit[5367]: NETFILTER_CFG table=filter:122 family=2 entries=34 op=nft_register_rule pid=5367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:20.615000 audit[5367]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffd177fd240 a2=0 a3=7ffd177fd22c items=0 ppid=3061 pid=5367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:20.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:20.621000 audit[5367]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=5367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:20.621000 audit[5367]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd177fd240 a2=0 a3=0 items=0 ppid=3061 pid=5367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:20.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:21.161745 systemd[1]: run-containerd-runc-k8s.io-c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258-runc.ZH99f0.mount: Deactivated successfully. Jul 2 07:54:21.169000 audit[5327]: AVC avc: denied { watch } for pid=5327 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_54_14.3015234297/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c30 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c25,c30 tclass=file permissive=0 Jul 2 07:54:21.169000 audit[5327]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bf4180 a2=fc6 a3=0 items=0 ppid=5244 pid=5327 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c30 key=(null) Jul 2 07:54:21.169000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:54:21.502000 audit[5371]: NETFILTER_CFG table=filter:124 family=2 entries=33 op=nft_register_rule pid=5371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:21.502000 audit[5371]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffef6004690 a2=0 a3=7ffef600467c items=0 ppid=3061 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:21.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:21.503000 audit[5371]: NETFILTER_CFG table=nat:125 family=2 entries=27 op=nft_register_chain pid=5371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:21.503000 audit[5371]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffef6004690 a2=0 a3=0 items=0 ppid=3061 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:21.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:24.494427 systemd[1]: Started sshd@20-172.31.20.226:22-139.178.89.65:47744.service. Jul 2 07:54:24.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.20.226:22-139.178.89.65:47744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:24.503853 kernel: kauditd_printk_skb: 91 callbacks suppressed Jul 2 07:54:24.503995 kernel: audit: type=1130 audit(1719906864.495:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.20.226:22-139.178.89.65:47744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:24.726000 audit[5378]: USER_ACCT pid=5378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:24.742362 kernel: audit: type=1101 audit(1719906864.726:1355): pid=5378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:24.742520 sshd[5378]: Accepted publickey for core from 139.178.89.65 port 47744 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:24.740000 audit[5378]: CRED_ACQ pid=5378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:24.750633 sshd[5378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:24.753134 kernel: audit: type=1103 audit(1719906864.740:1356): pid=5378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:24.740000 audit[5378]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5a09ad80 a2=3 a3=0 items=0 ppid=1 pid=5378 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:24.764321 kernel: audit: type=1006 audit(1719906864.740:1357): pid=5378 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jul 2 07:54:24.764450 kernel: audit: type=1300 audit(1719906864.740:1357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5a09ad80 a2=3 a3=0 items=0 ppid=1 pid=5378 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:24.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:24.767532 kernel: audit: type=1327 audit(1719906864.740:1357): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:24.771004 systemd-logind[1726]: New session 21 of user core. Jul 2 07:54:24.772179 systemd[1]: Started session-21.scope. Jul 2 07:54:24.777000 audit[5378]: USER_START pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:24.783000 audit[5380]: CRED_ACQ pid=5380 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:24.793223 kernel: audit: type=1105 audit(1719906864.777:1358): pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:24.794256 kernel: audit: type=1103 audit(1719906864.783:1359): pid=5380 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:25.146329 sshd[5378]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:25.147000 audit[5378]: USER_END pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:25.151165 systemd[1]: sshd@20-172.31.20.226:22-139.178.89.65:47744.service: Deactivated successfully. Jul 2 07:54:25.152992 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 07:54:25.147000 audit[5378]: CRED_DISP pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:25.163265 kernel: audit: type=1106 audit(1719906865.147:1360): pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:25.163396 kernel: audit: type=1104 audit(1719906865.147:1361): pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:25.163337 systemd-logind[1726]: Session 21 logged out. Waiting for processes to exit. Jul 2 07:54:25.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.20.226:22-139.178.89.65:47744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:25.165123 systemd-logind[1726]: Removed session 21. Jul 2 07:54:26.827000 audit[5392]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:26.827000 audit[5392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff560af900 a2=0 a3=7fff560af8ec items=0 ppid=3061 pid=5392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:26.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:26.830000 audit[5392]: NETFILTER_CFG table=nat:127 family=2 entries=106 op=nft_register_chain pid=5392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:26.830000 audit[5392]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff560af900 a2=0 a3=7fff560af8ec items=0 ppid=3061 pid=5392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:26.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:30.185069 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 07:54:30.185243 kernel: audit: type=1130 audit(1719906870.176:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.20.226:22-139.178.89.65:39266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:30.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.20.226:22-139.178.89.65:39266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:30.177691 systemd[1]: Started sshd@21-172.31.20.226:22-139.178.89.65:39266.service. Jul 2 07:54:30.357588 kernel: audit: type=1101 audit(1719906870.349:1366): pid=5395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.349000 audit[5395]: USER_ACCT pid=5395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.357850 sshd[5395]: Accepted publickey for core from 139.178.89.65 port 39266 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:30.358165 sshd[5395]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:30.356000 audit[5395]: CRED_ACQ pid=5395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.368093 kernel: audit: type=1103 audit(1719906870.356:1367): pid=5395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.368227 kernel: audit: type=1006 audit(1719906870.356:1368): pid=5395 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 07:54:30.356000 audit[5395]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd115e1c0 a2=3 a3=0 items=0 ppid=1 pid=5395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.374384 kernel: audit: type=1300 audit(1719906870.356:1368): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd115e1c0 a2=3 a3=0 items=0 ppid=1 pid=5395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.374525 kernel: audit: type=1327 audit(1719906870.356:1368): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:30.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:30.380351 systemd-logind[1726]: New session 22 of user core. Jul 2 07:54:30.380953 systemd[1]: Started session-22.scope. Jul 2 07:54:30.386000 audit[5395]: USER_START pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.388000 audit[5397]: CRED_ACQ pid=5397 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.400851 kernel: audit: type=1105 audit(1719906870.386:1369): pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.401034 kernel: audit: type=1103 audit(1719906870.388:1370): pid=5397 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.593947 sshd[5395]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:30.594000 audit[5395]: USER_END pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.611756 kernel: audit: type=1106 audit(1719906870.594:1371): pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.611910 kernel: audit: type=1104 audit(1719906870.594:1372): pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.594000 audit[5395]: CRED_DISP pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:30.633042 systemd[1]: sshd@21-172.31.20.226:22-139.178.89.65:39266.service: Deactivated successfully. Jul 2 07:54:30.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.20.226:22-139.178.89.65:39266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:30.636031 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 07:54:30.638204 systemd-logind[1726]: Session 22 logged out. Waiting for processes to exit. Jul 2 07:54:30.642259 systemd-logind[1726]: Removed session 22. Jul 2 07:54:35.627153 systemd[1]: Started sshd@22-172.31.20.226:22-139.178.89.65:39272.service. Jul 2 07:54:35.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.20.226:22-139.178.89.65:39272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.631546 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:54:35.631621 kernel: audit: type=1130 audit(1719906875.628:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.20.226:22-139.178.89.65:39272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:35.822000 audit[5414]: USER_ACCT pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:35.830305 sshd[5414]: Accepted publickey for core from 139.178.89.65 port 39272 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:35.830727 kernel: audit: type=1101 audit(1719906875.822:1375): pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:35.828000 audit[5414]: CRED_ACQ pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:35.830911 sshd[5414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:35.836686 kernel: audit: type=1103 audit(1719906875.828:1376): pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:35.841574 kernel: audit: type=1006 audit(1719906875.828:1377): pid=5414 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 07:54:35.841704 kernel: audit: type=1300 audit(1719906875.828:1377): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5c6a78c0 a2=3 a3=0 items=0 ppid=1 pid=5414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.828000 audit[5414]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5c6a78c0 a2=3 a3=0 items=0 ppid=1 pid=5414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.828000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:35.850505 kernel: audit: type=1327 audit(1719906875.828:1377): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:35.852499 systemd[1]: Started session-23.scope. Jul 2 07:54:35.853623 systemd-logind[1726]: New session 23 of user core. Jul 2 07:54:35.861000 audit[5414]: USER_START pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:35.868000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:35.875182 kernel: audit: type=1105 audit(1719906875.861:1378): pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:35.875278 kernel: audit: type=1103 audit(1719906875.868:1379): pid=5419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:36.058573 sshd[5414]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:36.058000 audit[5414]: USER_END pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:36.058000 audit[5414]: CRED_DISP pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:36.072222 kernel: audit: type=1106 audit(1719906876.058:1380): pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:36.072329 kernel: audit: type=1104 audit(1719906876.058:1381): pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:36.072567 systemd[1]: sshd@22-172.31.20.226:22-139.178.89.65:39272.service: Deactivated successfully. Jul 2 07:54:36.073458 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 07:54:36.074375 systemd-logind[1726]: Session 23 logged out. Waiting for processes to exit. Jul 2 07:54:36.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.20.226:22-139.178.89.65:39272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:36.075506 systemd-logind[1726]: Removed session 23. Jul 2 07:54:38.008066 systemd[1]: run-containerd-runc-k8s.io-f21a1d472bffb8317a19f61889276a16210ca62b2df6debc8b09441aaf41c507-runc.yifI6I.mount: Deactivated successfully. Jul 2 07:54:40.672000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.675809 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:54:40.675929 kernel: audit: type=1400 audit(1719906880.672:1383): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.679000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.686301 kernel: audit: type=1400 audit(1719906880.679:1384): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:40.679000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c59aa0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:54:40.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:40.700459 kernel: audit: type=1300 audit(1719906880.679:1384): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c59aa0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:54:40.700599 kernel: audit: type=1327 audit(1719906880.679:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:40.672000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c3860 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:54:40.708700 kernel: audit: type=1300 audit(1719906880.672:1383): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c3860 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:54:40.708836 kernel: audit: type=1327 audit(1719906880.672:1383): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:40.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:41.089245 systemd[1]: Started sshd@23-172.31.20.226:22-139.178.89.65:40156.service. Jul 2 07:54:41.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.20.226:22-139.178.89.65:40156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:41.096508 kernel: audit: type=1130 audit(1719906881.089:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.20.226:22-139.178.89.65:40156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:41.291000 audit[5452]: USER_ACCT pid=5452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:41.297740 sshd[5452]: Accepted publickey for core from 139.178.89.65 port 40156 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:41.299550 kernel: audit: type=1101 audit(1719906881.291:1386): pid=5452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:41.298000 audit[5452]: CRED_ACQ pid=5452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:41.307055 sshd[5452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:41.309256 kernel: audit: type=1103 audit(1719906881.298:1387): pid=5452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:41.309350 kernel: audit: type=1006 audit(1719906881.298:1388): pid=5452 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 07:54:41.298000 audit[5452]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff38276520 a2=3 a3=0 items=0 ppid=1 pid=5452 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:41.298000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:41.314058 systemd-logind[1726]: New session 24 of user core. Jul 2 07:54:41.314652 systemd[1]: Started session-24.scope. Jul 2 07:54:41.319000 audit[5452]: USER_START pid=5452 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:41.321000 audit[5454]: CRED_ACQ pid=5454 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:41.747067 sshd[5452]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:41.747000 audit[5452]: USER_END pid=5452 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:41.747000 audit[5452]: CRED_DISP pid=5452 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:41.750773 systemd[1]: sshd@23-172.31.20.226:22-139.178.89.65:40156.service: Deactivated successfully. Jul 2 07:54:41.751872 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 07:54:41.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.20.226:22-139.178.89.65:40156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:41.753318 systemd-logind[1726]: Session 24 logged out. Waiting for processes to exit. Jul 2 07:54:41.754582 systemd-logind[1726]: Removed session 24. Jul 2 07:54:42.025000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:42.025000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:42.025000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c005a9f170 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:54:42.025000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0061e2240 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:54:42.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:42.025000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:42.025000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0061e2270 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:54:42.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:42.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:42.027000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:42.027000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c005a9f1a0 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:54:42.027000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:42.028000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:42.028000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c010d6de80 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:54:42.028000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:42.039000 audit[2528]: AVC avc: denied { watch } for pid=2528 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:42.039000 audit[2528]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00538adc0 a2=fc6 a3=0 items=0 ppid=2395 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c445 key=(null) Jul 2 07:54:42.039000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32302E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 07:54:43.117000 audit[5464]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:43.117000 audit[5464]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff1144e30 a2=0 a3=7ffff1144e1c items=0 ppid=3061 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:43.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:43.120000 audit[5464]: NETFILTER_CFG table=nat:129 family=2 entries=58 op=nft_register_chain pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:43.120000 audit[5464]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffff1144e30 a2=0 a3=7ffff1144e1c items=0 ppid=3061 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:43.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:46.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.20.226:22-139.178.89.65:40160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:46.779898 systemd[1]: Started sshd@24-172.31.20.226:22-139.178.89.65:40160.service. Jul 2 07:54:46.784638 kernel: kauditd_printk_skb: 31 callbacks suppressed Jul 2 07:54:46.784763 kernel: audit: type=1130 audit(1719906886.778:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.20.226:22-139.178.89.65:40160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:46.950123 sshd[5471]: Accepted publickey for core from 139.178.89.65 port 40160 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:46.948000 audit[5471]: USER_ACCT pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:46.964468 kernel: audit: type=1101 audit(1719906886.948:1403): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:46.964000 audit[5471]: CRED_ACQ pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:46.967081 sshd[5471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:46.976940 kernel: audit: type=1103 audit(1719906886.964:1404): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:46.964000 audit[5471]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8808090 a2=3 a3=0 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:46.993160 kernel: audit: type=1006 audit(1719906886.964:1405): pid=5471 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 07:54:46.993378 kernel: audit: type=1300 audit(1719906886.964:1405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8808090 a2=3 a3=0 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:46.993456 kernel: audit: type=1327 audit(1719906886.964:1405): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:46.964000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:47.000180 systemd-logind[1726]: New session 25 of user core. Jul 2 07:54:47.000634 systemd[1]: Started session-25.scope. Jul 2 07:54:47.009000 audit[5471]: USER_START pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:47.025611 kernel: audit: type=1105 audit(1719906887.009:1406): pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:47.026238 kernel: audit: type=1103 audit(1719906887.013:1407): pid=5473 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:47.013000 audit[5473]: CRED_ACQ pid=5473 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:47.372581 sshd[5471]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:47.376000 audit[5471]: USER_END pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:47.382051 systemd[1]: sshd@24-172.31.20.226:22-139.178.89.65:40160.service: Deactivated successfully. Jul 2 07:54:47.387455 kernel: audit: type=1106 audit(1719906887.376:1408): pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:47.388102 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 07:54:47.388864 systemd-logind[1726]: Session 25 logged out. Waiting for processes to exit. Jul 2 07:54:47.376000 audit[5471]: CRED_DISP pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:47.398798 kernel: audit: type=1104 audit(1719906887.376:1409): pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:47.398197 systemd-logind[1726]: Removed session 25. Jul 2 07:54:47.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.20.226:22-139.178.89.65:40160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:50.356414 systemd[1]: run-containerd-runc-k8s.io-c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258-runc.jQgMxh.mount: Deactivated successfully. Jul 2 07:54:52.397805 systemd[1]: Started sshd@25-172.31.20.226:22-139.178.89.65:40624.service. Jul 2 07:54:52.403065 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:54:52.403210 kernel: audit: type=1130 audit(1719906892.397:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.20.226:22-139.178.89.65:40624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:52.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.20.226:22-139.178.89.65:40624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:52.604474 kernel: audit: type=1101 audit(1719906892.595:1412): pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.595000 audit[5510]: USER_ACCT pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.605013 sshd[5510]: Accepted publickey for core from 139.178.89.65 port 40624 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:54:52.603000 audit[5510]: CRED_ACQ pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.613199 sshd[5510]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:52.614994 kernel: audit: type=1103 audit(1719906892.603:1413): pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.615314 kernel: audit: type=1006 audit(1719906892.603:1414): pid=5510 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 07:54:52.603000 audit[5510]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4a660620 a2=3 a3=0 items=0 ppid=1 pid=5510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:52.603000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:52.625598 kernel: audit: type=1300 audit(1719906892.603:1414): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4a660620 a2=3 a3=0 items=0 ppid=1 pid=5510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:52.625680 kernel: audit: type=1327 audit(1719906892.603:1414): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:52.626825 systemd-logind[1726]: New session 26 of user core. Jul 2 07:54:52.627621 systemd[1]: Started session-26.scope. Jul 2 07:54:52.641608 kernel: audit: type=1105 audit(1719906892.632:1415): pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.632000 audit[5510]: USER_START pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.641000 audit[5512]: CRED_ACQ pid=5512 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.648469 kernel: audit: type=1103 audit(1719906892.641:1416): pid=5512 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.962517 sshd[5510]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:52.962000 audit[5510]: USER_END pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.971797 systemd-logind[1726]: Session 26 logged out. Waiting for processes to exit. Jul 2 07:54:52.973595 kernel: audit: type=1106 audit(1719906892.962:1417): pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.973709 kernel: audit: type=1104 audit(1719906892.963:1418): pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.963000 audit[5510]: CRED_DISP pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:54:52.975538 systemd[1]: sshd@25-172.31.20.226:22-139.178.89.65:40624.service: Deactivated successfully. Jul 2 07:54:52.976711 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 07:54:52.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.20.226:22-139.178.89.65:40624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:52.980958 systemd-logind[1726]: Removed session 26. Jul 2 07:54:55.808785 systemd[1]: run-containerd-runc-k8s.io-c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258-runc.VPUEc2.mount: Deactivated successfully. Jul 2 07:54:56.533000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:56.533000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b50d60 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:54:56.533000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:56.543000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:56.543000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:56.543000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b90820 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:54:56.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:56.543000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b50d80 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:54:56.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:56.543000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:56.543000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b50da0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:54:56.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:06.844765 systemd[1]: cri-containerd-6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189.scope: Deactivated successfully. Jul 2 07:55:06.845108 systemd[1]: cri-containerd-6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189.scope: Consumed 3.452s CPU time. Jul 2 07:55:06.853623 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:55:06.853760 kernel: audit: type=1334 audit(1719906906.846:1424): prog-id=80 op=UNLOAD Jul 2 07:55:06.853800 kernel: audit: type=1334 audit(1719906906.846:1425): prog-id=96 op=UNLOAD Jul 2 07:55:06.846000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:55:06.846000 audit: BPF prog-id=96 op=UNLOAD Jul 2 07:55:06.884500 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189-rootfs.mount: Deactivated successfully. Jul 2 07:55:06.886181 env[1736]: time="2024-07-02T07:55:06.886116968Z" level=info msg="shim disconnected" id=6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189 Jul 2 07:55:06.886181 env[1736]: time="2024-07-02T07:55:06.886171848Z" level=warning msg="cleaning up after shim disconnected" id=6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189 namespace=k8s.io Jul 2 07:55:06.886677 env[1736]: time="2024-07-02T07:55:06.886186768Z" level=info msg="cleaning up dead shim" Jul 2 07:55:06.899711 env[1736]: time="2024-07-02T07:55:06.899661741Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5575 runtime=io.containerd.runc.v2\n" Jul 2 07:55:07.665582 kubelet[2812]: I0702 07:55:07.665421 2812 scope.go:117] "RemoveContainer" containerID="6878056fb21a50a1fbb7bf89ec8df7fc5af0bb2a2364e55afffc0ffb46462189" Jul 2 07:55:07.677965 env[1736]: time="2024-07-02T07:55:07.677902595Z" level=info msg="CreateContainer within sandbox \"5aa2ffcd4e01f9ea980b9751ada2dc2e8554c10ceea393a7cf98ec9e93e332a2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Jul 2 07:55:07.721966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount133549500.mount: Deactivated successfully. Jul 2 07:55:07.727878 env[1736]: time="2024-07-02T07:55:07.727834505Z" level=info msg="CreateContainer within sandbox \"5aa2ffcd4e01f9ea980b9751ada2dc2e8554c10ceea393a7cf98ec9e93e332a2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"9545cf493b762237525f3456522f77d16441294ce05be3fdb03ac53284d80cee\"" Jul 2 07:55:07.728627 env[1736]: time="2024-07-02T07:55:07.728589911Z" level=info msg="StartContainer for \"9545cf493b762237525f3456522f77d16441294ce05be3fdb03ac53284d80cee\"" Jul 2 07:55:07.776483 systemd[1]: Started cri-containerd-9545cf493b762237525f3456522f77d16441294ce05be3fdb03ac53284d80cee.scope. Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.812401 kernel: audit: type=1400 audit(1719906907.800:1426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.812557 kernel: audit: type=1400 audit(1719906907.800:1427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.812663 kernel: audit: type=1400 audit(1719906907.800:1428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.817065 kernel: audit: type=1400 audit(1719906907.800:1429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.825618 kernel: audit: type=1400 audit(1719906907.800:1430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.825739 kernel: audit: type=1400 audit(1719906907.800:1431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.834401 kernel: audit: type=1400 audit(1719906907.800:1432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.834553 kernel: audit: type=1400 audit(1719906907.800:1433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.801000 audit: BPF prog-id=188 op=LOAD Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2424 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:07.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343563663439336237363232333735323566333435363532326637 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2424 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:07.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343563663439336237363232333735323566333435363532326637 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.806000 audit: BPF prog-id=189 op=LOAD Jul 2 07:55:07.806000 audit[5598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d6ca0 items=0 ppid=2424 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:07.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343563663439336237363232333735323566333435363532326637 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.820000 audit: BPF prog-id=190 op=LOAD Jul 2 07:55:07.820000 audit[5598]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d6ce8 items=0 ppid=2424 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:07.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343563663439336237363232333735323566333435363532326637 Jul 2 07:55:07.833000 audit: BPF prog-id=190 op=UNLOAD Jul 2 07:55:07.833000 audit: BPF prog-id=189 op=UNLOAD Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { perfmon } for pid=5598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit[5598]: AVC avc: denied { bpf } for pid=5598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:07.833000 audit: BPF prog-id=191 op=LOAD Jul 2 07:55:07.833000 audit[5598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d70f8 items=0 ppid=2424 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:07.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343563663439336237363232333735323566333435363532326637 Jul 2 07:55:07.879718 env[1736]: time="2024-07-02T07:55:07.879668735Z" level=info msg="StartContainer for \"9545cf493b762237525f3456522f77d16441294ce05be3fdb03ac53284d80cee\" returns successfully" Jul 2 07:55:08.014167 systemd[1]: run-containerd-runc-k8s.io-f21a1d472bffb8317a19f61889276a16210ca62b2df6debc8b09441aaf41c507-runc.901IVh.mount: Deactivated successfully. Jul 2 07:55:08.103016 systemd[1]: cri-containerd-dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520.scope: Deactivated successfully. Jul 2 07:55:08.103659 systemd[1]: cri-containerd-dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520.scope: Consumed 6.135s CPU time. Jul 2 07:55:08.102000 audit: BPF prog-id=117 op=UNLOAD Jul 2 07:55:08.106000 audit: BPF prog-id=120 op=UNLOAD Jul 2 07:55:08.133332 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520-rootfs.mount: Deactivated successfully. Jul 2 07:55:08.135344 env[1736]: time="2024-07-02T07:55:08.135294589Z" level=info msg="shim disconnected" id=dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520 Jul 2 07:55:08.136289 env[1736]: time="2024-07-02T07:55:08.135347385Z" level=warning msg="cleaning up after shim disconnected" id=dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520 namespace=k8s.io Jul 2 07:55:08.136289 env[1736]: time="2024-07-02T07:55:08.135360212Z" level=info msg="cleaning up dead shim" Jul 2 07:55:08.147474 env[1736]: time="2024-07-02T07:55:08.147401585Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5659 runtime=io.containerd.runc.v2\n" Jul 2 07:55:08.671222 kubelet[2812]: I0702 07:55:08.671190 2812 scope.go:117] "RemoveContainer" containerID="dc44459548eb584600cb8274fc6a5f0d55f789d6c841fdc9fbbc9e0f2c171520" Jul 2 07:55:08.674664 env[1736]: time="2024-07-02T07:55:08.674625080Z" level=info msg="CreateContainer within sandbox \"6b4131a32628831ee26a0afd28c61b4a469afd604e9bdbfa56555571a7b7d455\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Jul 2 07:55:08.709983 env[1736]: time="2024-07-02T07:55:08.709927820Z" level=info msg="CreateContainer within sandbox \"6b4131a32628831ee26a0afd28c61b4a469afd604e9bdbfa56555571a7b7d455\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"120ade92d09b3fcdb56bad17e3edb84e5fb452f11cb284076a95411e52c08e02\"" Jul 2 07:55:08.711499 env[1736]: time="2024-07-02T07:55:08.711429726Z" level=info msg="StartContainer for \"120ade92d09b3fcdb56bad17e3edb84e5fb452f11cb284076a95411e52c08e02\"" Jul 2 07:55:08.746796 systemd[1]: Started cri-containerd-120ade92d09b3fcdb56bad17e3edb84e5fb452f11cb284076a95411e52c08e02.scope. Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.787000 audit: BPF prog-id=192 op=LOAD Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3016 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306164653932643039623366636462353662616431376533656462 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3016 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306164653932643039623366636462353662616431376533656462 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit: BPF prog-id=193 op=LOAD Jul 2 07:55:08.788000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219be0 items=0 ppid=3016 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306164653932643039623366636462353662616431376533656462 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit: BPF prog-id=194 op=LOAD Jul 2 07:55:08.788000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219c28 items=0 ppid=3016 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306164653932643039623366636462353662616431376533656462 Jul 2 07:55:08.788000 audit: BPF prog-id=194 op=UNLOAD Jul 2 07:55:08.788000 audit: BPF prog-id=193 op=UNLOAD Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:08.788000 audit: BPF prog-id=195 op=LOAD Jul 2 07:55:08.788000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00027e038 items=0 ppid=3016 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306164653932643039623366636462353662616431376533656462 Jul 2 07:55:08.820690 env[1736]: time="2024-07-02T07:55:08.820550195Z" level=info msg="StartContainer for \"120ade92d09b3fcdb56bad17e3edb84e5fb452f11cb284076a95411e52c08e02\" returns successfully" Jul 2 07:55:08.885893 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3778573870.mount: Deactivated successfully. Jul 2 07:55:09.292000 audit[5608]: AVC avc: denied { watch } for pid=5608 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:09.292000 audit[5608]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006a06c0 a2=fc6 a3=0 items=0 ppid=2424 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:55:09.292000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:09.295000 audit[5608]: AVC avc: denied { watch } for pid=5608 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:09.295000 audit[5608]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00013c3e0 a2=fc6 a3=0 items=0 ppid=2424 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) Jul 2 07:55:09.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:10.405464 kubelet[2812]: E0702 07:55:10.405398 2812 controller.go:195] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io ip-172-31-20-226)" Jul 2 07:55:11.836193 systemd[1]: cri-containerd-2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934.scope: Deactivated successfully. Jul 2 07:55:11.836538 systemd[1]: cri-containerd-2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934.scope: Consumed 2.043s CPU time. Jul 2 07:55:11.838000 audit: BPF prog-id=84 op=UNLOAD Jul 2 07:55:11.838000 audit: BPF prog-id=105 op=UNLOAD Jul 2 07:55:11.892909 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934-rootfs.mount: Deactivated successfully. Jul 2 07:55:11.897519 env[1736]: time="2024-07-02T07:55:11.897421224Z" level=info msg="shim disconnected" id=2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934 Jul 2 07:55:11.898012 env[1736]: time="2024-07-02T07:55:11.897539957Z" level=warning msg="cleaning up after shim disconnected" id=2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934 namespace=k8s.io Jul 2 07:55:11.898012 env[1736]: time="2024-07-02T07:55:11.897553391Z" level=info msg="cleaning up dead shim" Jul 2 07:55:11.908178 env[1736]: time="2024-07-02T07:55:11.908043316Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5722 runtime=io.containerd.runc.v2\n" Jul 2 07:55:12.688286 kubelet[2812]: I0702 07:55:12.688252 2812 scope.go:117] "RemoveContainer" containerID="2789978c0c32e097cfdac7c337603d8011a4ae4f596884ca0c59d54485528934" Jul 2 07:55:12.692894 env[1736]: time="2024-07-02T07:55:12.692840605Z" level=info msg="CreateContainer within sandbox \"55d62d91823688302fd75ed15bdadd052747762c287707de5b0255ee47901f03\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Jul 2 07:55:12.721809 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2794316283.mount: Deactivated successfully. Jul 2 07:55:12.727703 env[1736]: time="2024-07-02T07:55:12.727653533Z" level=info msg="CreateContainer within sandbox \"55d62d91823688302fd75ed15bdadd052747762c287707de5b0255ee47901f03\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"2e4362a934aa82c173977645f19bb5d68e5bd89c822f977f0f8acfd7198f4452\"" Jul 2 07:55:12.728806 env[1736]: time="2024-07-02T07:55:12.728771831Z" level=info msg="StartContainer for \"2e4362a934aa82c173977645f19bb5d68e5bd89c822f977f0f8acfd7198f4452\"" Jul 2 07:55:12.781016 systemd[1]: Started cri-containerd-2e4362a934aa82c173977645f19bb5d68e5bd89c822f977f0f8acfd7198f4452.scope. Jul 2 07:55:12.842649 kernel: kauditd_printk_skb: 116 callbacks suppressed Jul 2 07:55:12.842814 kernel: audit: type=1400 audit(1719906912.835:1468): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.847377 kernel: audit: type=1400 audit(1719906912.835:1469): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.858129 kernel: audit: type=1400 audit(1719906912.835:1470): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.858248 kernel: audit: type=1400 audit(1719906912.835:1471): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.863577 kernel: audit: type=1400 audit(1719906912.835:1472): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.869655 kernel: audit: type=1400 audit(1719906912.835:1473): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.879836 kernel: audit: type=1400 audit(1719906912.835:1474): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.879964 kernel: audit: type=1400 audit(1719906912.835:1475): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.884963 kernel: audit: type=1400 audit(1719906912.835:1476): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.891101 kernel: audit: type=1400 audit(1719906912.841:1477): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.841000 audit: BPF prog-id=196 op=LOAD Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2419 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265343336326139333461613832633137333937373634356631396262 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2419 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265343336326139333461613832633137333937373634356631396262 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.846000 audit: BPF prog-id=197 op=LOAD Jul 2 07:55:12.846000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00015dd00 items=0 ppid=2419 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265343336326139333461613832633137333937373634356631396262 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.851000 audit: BPF prog-id=198 op=LOAD Jul 2 07:55:12.851000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00015dd48 items=0 ppid=2419 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265343336326139333461613832633137333937373634356631396262 Jul 2 07:55:12.856000 audit: BPF prog-id=198 op=UNLOAD Jul 2 07:55:12.856000 audit: BPF prog-id=197 op=UNLOAD Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.857000 audit: BPF prog-id=199 op=LOAD Jul 2 07:55:12.857000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000358158 items=0 ppid=2419 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265343336326139333461613832633137333937373634356631396262 Jul 2 07:55:12.924151 env[1736]: time="2024-07-02T07:55:12.924094778Z" level=info msg="StartContainer for \"2e4362a934aa82c173977645f19bb5d68e5bd89c822f977f0f8acfd7198f4452\" returns successfully" Jul 2 07:55:20.392125 systemd[1]: run-containerd-runc-k8s.io-c53ef66ece5ef4bd2a1177274853b1d783c5afe54eb5a65451f64748a691b258-runc.BEzjji.mount: Deactivated successfully. Jul 2 07:55:20.423616 kubelet[2812]: E0702 07:55:20.411129 2812 controller.go:195] "Failed to update lease" err="Put \"https://172.31.20.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-20-226?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:55:21.174852 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 07:55:21.178268 kernel: audit: type=1400 audit(1719906921.170:1486): avc: denied { watch } for pid=5327 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_54_14.3015234297/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c30 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c25,c30 tclass=file permissive=0 Jul 2 07:55:21.170000 audit[5327]: AVC avc: denied { watch } for pid=5327 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_54_14.3015234297/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c30 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c25,c30 tclass=file permissive=0 Jul 2 07:55:21.170000 audit[5327]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001137020 a2=fc6 a3=0 items=0 ppid=5244 pid=5327 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c30 key=(null) Jul 2 07:55:21.209324 kernel: audit: type=1300 audit(1719906921.170:1486): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001137020 a2=fc6 a3=0 items=0 ppid=5244 pid=5327 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c30 key=(null) Jul 2 07:55:21.209665 kernel: audit: type=1327 audit(1719906921.170:1486): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:55:21.170000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274