Jul 2 00:44:22.948704 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Jul 2 00:44:22.948744 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 00:44:22.948766 kernel: efi: EFI v2.70 by EDK II Jul 2 00:44:22.948781 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x7173cf98 Jul 2 00:44:22.948795 kernel: ACPI: Early table checksum verification disabled Jul 2 00:44:22.948808 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Jul 2 00:44:22.948824 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Jul 2 00:44:22.948839 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Jul 2 00:44:22.948852 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Jul 2 00:44:22.948866 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Jul 2 00:44:22.948884 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Jul 2 00:44:22.948898 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Jul 2 00:44:22.948912 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Jul 2 00:44:22.948926 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Jul 2 00:44:22.948942 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Jul 2 00:44:22.948961 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Jul 2 00:44:22.948976 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Jul 2 00:44:22.948990 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Jul 2 00:44:22.949005 kernel: printk: bootconsole [uart0] enabled Jul 2 00:44:22.949019 kernel: NUMA: Failed to initialise from firmware Jul 2 00:44:22.949034 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Jul 2 00:44:22.949049 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Jul 2 00:44:22.949063 kernel: Zone ranges: Jul 2 00:44:22.949078 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Jul 2 00:44:22.949093 kernel: DMA32 empty Jul 2 00:44:22.949108 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Jul 2 00:44:22.949126 kernel: Movable zone start for each node Jul 2 00:44:22.949141 kernel: Early memory node ranges Jul 2 00:44:22.949155 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Jul 2 00:44:22.949170 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Jul 2 00:44:22.949184 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Jul 2 00:44:22.949199 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Jul 2 00:44:22.949213 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Jul 2 00:44:22.949227 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Jul 2 00:44:22.949242 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Jul 2 00:44:22.949256 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Jul 2 00:44:22.949270 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Jul 2 00:44:22.949285 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Jul 2 00:44:22.949304 kernel: psci: probing for conduit method from ACPI. Jul 2 00:44:22.949318 kernel: psci: PSCIv1.0 detected in firmware. Jul 2 00:44:22.949339 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 00:44:22.949355 kernel: psci: Trusted OS migration not required Jul 2 00:44:22.949370 kernel: psci: SMC Calling Convention v1.1 Jul 2 00:44:22.949389 kernel: ACPI: SRAT not present Jul 2 00:44:22.949405 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 00:44:22.949421 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 00:44:22.949436 kernel: pcpu-alloc: [0] 0 [0] 1 Jul 2 00:44:22.949474 kernel: Detected PIPT I-cache on CPU0 Jul 2 00:44:22.949491 kernel: CPU features: detected: GIC system register CPU interface Jul 2 00:44:22.949506 kernel: CPU features: detected: Spectre-v2 Jul 2 00:44:22.949522 kernel: CPU features: detected: Spectre-v3a Jul 2 00:44:22.949537 kernel: CPU features: detected: Spectre-BHB Jul 2 00:44:22.949552 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 00:44:22.949567 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 00:44:22.949588 kernel: CPU features: detected: ARM erratum 1742098 Jul 2 00:44:22.949603 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Jul 2 00:44:22.949618 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Jul 2 00:44:22.949633 kernel: Policy zone: Normal Jul 2 00:44:22.949651 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:44:22.949668 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 00:44:22.949683 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 00:44:22.949699 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 00:44:22.949714 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 00:44:22.949730 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Jul 2 00:44:22.949750 kernel: Memory: 3824588K/4030464K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 205876K reserved, 0K cma-reserved) Jul 2 00:44:22.949766 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 00:44:22.949781 kernel: trace event string verifier disabled Jul 2 00:44:22.949796 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 00:44:22.949812 kernel: rcu: RCU event tracing is enabled. Jul 2 00:44:22.949828 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 00:44:22.949844 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 00:44:22.949860 kernel: Tracing variant of Tasks RCU enabled. Jul 2 00:44:22.949875 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 00:44:22.949891 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 00:44:22.949906 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 00:44:22.949921 kernel: GICv3: 96 SPIs implemented Jul 2 00:44:22.949940 kernel: GICv3: 0 Extended SPIs implemented Jul 2 00:44:22.949955 kernel: GICv3: Distributor has no Range Selector support Jul 2 00:44:22.949970 kernel: Root IRQ handler: gic_handle_irq Jul 2 00:44:22.949985 kernel: GICv3: 16 PPIs implemented Jul 2 00:44:22.950000 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Jul 2 00:44:22.950015 kernel: ACPI: SRAT not present Jul 2 00:44:22.950030 kernel: ITS [mem 0x10080000-0x1009ffff] Jul 2 00:44:22.950045 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Jul 2 00:44:22.950061 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Jul 2 00:44:22.950076 kernel: GICv3: using LPI property table @0x00000004000c0000 Jul 2 00:44:22.950091 kernel: ITS: Using hypervisor restricted LPI range [128] Jul 2 00:44:22.950111 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Jul 2 00:44:22.950127 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Jul 2 00:44:22.950142 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Jul 2 00:44:22.950158 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Jul 2 00:44:22.950173 kernel: Console: colour dummy device 80x25 Jul 2 00:44:22.950189 kernel: printk: console [tty1] enabled Jul 2 00:44:22.950205 kernel: ACPI: Core revision 20210730 Jul 2 00:44:22.950220 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Jul 2 00:44:22.950236 kernel: pid_max: default: 32768 minimum: 301 Jul 2 00:44:22.950252 kernel: LSM: Security Framework initializing Jul 2 00:44:22.950271 kernel: SELinux: Initializing. Jul 2 00:44:22.950287 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:44:22.950303 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:44:22.950318 kernel: rcu: Hierarchical SRCU implementation. Jul 2 00:44:22.950334 kernel: Platform MSI: ITS@0x10080000 domain created Jul 2 00:44:22.950349 kernel: PCI/MSI: ITS@0x10080000 domain created Jul 2 00:44:22.950365 kernel: Remapping and enabling EFI services. Jul 2 00:44:22.950380 kernel: smp: Bringing up secondary CPUs ... Jul 2 00:44:22.950396 kernel: Detected PIPT I-cache on CPU1 Jul 2 00:44:22.950411 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Jul 2 00:44:22.950431 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Jul 2 00:44:22.950484 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Jul 2 00:44:22.950504 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 00:44:22.950520 kernel: SMP: Total of 2 processors activated. Jul 2 00:44:22.950536 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 00:44:22.950552 kernel: CPU features: detected: 32-bit EL1 Support Jul 2 00:44:22.950567 kernel: CPU features: detected: CRC32 instructions Jul 2 00:44:22.950583 kernel: CPU: All CPU(s) started at EL1 Jul 2 00:44:22.950598 kernel: alternatives: patching kernel code Jul 2 00:44:22.950619 kernel: devtmpfs: initialized Jul 2 00:44:22.950635 kernel: KASLR disabled due to lack of seed Jul 2 00:44:22.950661 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 00:44:22.950681 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 00:44:22.950697 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 00:44:22.950713 kernel: SMBIOS 3.0.0 present. Jul 2 00:44:22.950729 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Jul 2 00:44:22.950746 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 00:44:22.950762 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 00:44:22.950779 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 00:44:22.950796 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 00:44:22.950816 kernel: audit: initializing netlink subsys (disabled) Jul 2 00:44:22.950832 kernel: audit: type=2000 audit(0.248:1): state=initialized audit_enabled=0 res=1 Jul 2 00:44:22.950848 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 00:44:22.950865 kernel: cpuidle: using governor menu Jul 2 00:44:22.950881 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 00:44:22.950901 kernel: ASID allocator initialised with 32768 entries Jul 2 00:44:22.950917 kernel: ACPI: bus type PCI registered Jul 2 00:44:22.950934 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 00:44:22.950949 kernel: Serial: AMBA PL011 UART driver Jul 2 00:44:22.950966 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 00:44:22.950983 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 00:44:22.950999 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 00:44:22.951015 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 00:44:22.951031 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 00:44:22.951051 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 00:44:22.951067 kernel: ACPI: Added _OSI(Module Device) Jul 2 00:44:22.951083 kernel: ACPI: Added _OSI(Processor Device) Jul 2 00:44:22.951099 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 00:44:22.951115 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 00:44:22.951131 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 00:44:22.951147 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 00:44:22.951164 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 00:44:22.951180 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 00:44:22.951200 kernel: ACPI: Interpreter enabled Jul 2 00:44:22.951216 kernel: ACPI: Using GIC for interrupt routing Jul 2 00:44:22.951232 kernel: ACPI: MCFG table detected, 1 entries Jul 2 00:44:22.951248 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Jul 2 00:44:22.952588 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 00:44:22.952886 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 2 00:44:22.959416 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 2 00:44:22.963949 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Jul 2 00:44:22.964216 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Jul 2 00:44:22.964241 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Jul 2 00:44:22.964258 kernel: acpiphp: Slot [1] registered Jul 2 00:44:22.964275 kernel: acpiphp: Slot [2] registered Jul 2 00:44:22.964292 kernel: acpiphp: Slot [3] registered Jul 2 00:44:22.964309 kernel: acpiphp: Slot [4] registered Jul 2 00:44:22.964325 kernel: acpiphp: Slot [5] registered Jul 2 00:44:22.964341 kernel: acpiphp: Slot [6] registered Jul 2 00:44:22.964357 kernel: acpiphp: Slot [7] registered Jul 2 00:44:22.964379 kernel: acpiphp: Slot [8] registered Jul 2 00:44:22.964395 kernel: acpiphp: Slot [9] registered Jul 2 00:44:22.964411 kernel: acpiphp: Slot [10] registered Jul 2 00:44:22.964428 kernel: acpiphp: Slot [11] registered Jul 2 00:44:22.964470 kernel: acpiphp: Slot [12] registered Jul 2 00:44:22.964504 kernel: acpiphp: Slot [13] registered Jul 2 00:44:22.964521 kernel: acpiphp: Slot [14] registered Jul 2 00:44:22.964537 kernel: acpiphp: Slot [15] registered Jul 2 00:44:22.964553 kernel: acpiphp: Slot [16] registered Jul 2 00:44:22.964575 kernel: acpiphp: Slot [17] registered Jul 2 00:44:22.964591 kernel: acpiphp: Slot [18] registered Jul 2 00:44:22.964608 kernel: acpiphp: Slot [19] registered Jul 2 00:44:22.964624 kernel: acpiphp: Slot [20] registered Jul 2 00:44:22.964640 kernel: acpiphp: Slot [21] registered Jul 2 00:44:22.964656 kernel: acpiphp: Slot [22] registered Jul 2 00:44:22.964671 kernel: acpiphp: Slot [23] registered Jul 2 00:44:22.964688 kernel: acpiphp: Slot [24] registered Jul 2 00:44:22.964703 kernel: acpiphp: Slot [25] registered Jul 2 00:44:22.964719 kernel: acpiphp: Slot [26] registered Jul 2 00:44:22.964739 kernel: acpiphp: Slot [27] registered Jul 2 00:44:22.964755 kernel: acpiphp: Slot [28] registered Jul 2 00:44:22.964771 kernel: acpiphp: Slot [29] registered Jul 2 00:44:22.964788 kernel: acpiphp: Slot [30] registered Jul 2 00:44:22.964804 kernel: acpiphp: Slot [31] registered Jul 2 00:44:22.964820 kernel: PCI host bridge to bus 0000:00 Jul 2 00:44:22.965061 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Jul 2 00:44:22.965269 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 2 00:44:22.965501 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Jul 2 00:44:22.965713 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Jul 2 00:44:22.965957 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Jul 2 00:44:22.966198 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Jul 2 00:44:22.966423 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Jul 2 00:44:22.966695 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Jul 2 00:44:22.966951 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Jul 2 00:44:22.967177 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 00:44:22.967419 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Jul 2 00:44:22.967671 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Jul 2 00:44:22.967902 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Jul 2 00:44:22.968128 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Jul 2 00:44:22.968355 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 00:44:22.968629 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Jul 2 00:44:22.968859 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Jul 2 00:44:22.969106 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Jul 2 00:44:22.969333 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Jul 2 00:44:22.969593 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Jul 2 00:44:22.969806 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Jul 2 00:44:22.970016 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 2 00:44:22.970224 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Jul 2 00:44:22.970246 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 2 00:44:22.970263 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 2 00:44:22.970280 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 2 00:44:22.970296 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 2 00:44:22.970313 kernel: iommu: Default domain type: Translated Jul 2 00:44:22.970330 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 00:44:22.970346 kernel: vgaarb: loaded Jul 2 00:44:22.970362 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 00:44:22.970398 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 00:44:22.970415 kernel: PTP clock support registered Jul 2 00:44:22.970431 kernel: Registered efivars operations Jul 2 00:44:22.982516 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 00:44:22.982546 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 00:44:22.982563 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 00:44:22.982580 kernel: pnp: PnP ACPI init Jul 2 00:44:22.982837 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Jul 2 00:44:22.982871 kernel: pnp: PnP ACPI: found 1 devices Jul 2 00:44:22.982888 kernel: NET: Registered PF_INET protocol family Jul 2 00:44:22.982905 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 00:44:22.982922 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 00:44:22.982939 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 00:44:22.982955 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 00:44:22.982972 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 00:44:22.982989 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 00:44:22.983005 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:44:22.983026 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:44:22.983043 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 00:44:22.983059 kernel: PCI: CLS 0 bytes, default 64 Jul 2 00:44:22.983076 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Jul 2 00:44:22.983092 kernel: kvm [1]: HYP mode not available Jul 2 00:44:22.983108 kernel: Initialise system trusted keyrings Jul 2 00:44:22.983125 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 00:44:22.983141 kernel: Key type asymmetric registered Jul 2 00:44:22.983157 kernel: Asymmetric key parser 'x509' registered Jul 2 00:44:22.983177 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 00:44:22.983194 kernel: io scheduler mq-deadline registered Jul 2 00:44:22.983211 kernel: io scheduler kyber registered Jul 2 00:44:22.983227 kernel: io scheduler bfq registered Jul 2 00:44:22.983437 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Jul 2 00:44:22.983493 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 2 00:44:22.983510 kernel: ACPI: button: Power Button [PWRB] Jul 2 00:44:22.983528 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Jul 2 00:44:22.983550 kernel: ACPI: button: Sleep Button [SLPB] Jul 2 00:44:22.983567 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 00:44:22.983584 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Jul 2 00:44:22.983797 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Jul 2 00:44:22.983822 kernel: printk: console [ttyS0] disabled Jul 2 00:44:22.983839 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Jul 2 00:44:22.983855 kernel: printk: console [ttyS0] enabled Jul 2 00:44:22.983872 kernel: printk: bootconsole [uart0] disabled Jul 2 00:44:22.983889 kernel: thunder_xcv, ver 1.0 Jul 2 00:44:22.983905 kernel: thunder_bgx, ver 1.0 Jul 2 00:44:22.983926 kernel: nicpf, ver 1.0 Jul 2 00:44:22.983942 kernel: nicvf, ver 1.0 Jul 2 00:44:22.984148 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 00:44:22.984340 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T00:44:22 UTC (1719881062) Jul 2 00:44:22.984362 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 00:44:22.984379 kernel: NET: Registered PF_INET6 protocol family Jul 2 00:44:22.984395 kernel: Segment Routing with IPv6 Jul 2 00:44:22.984412 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 00:44:22.984433 kernel: NET: Registered PF_PACKET protocol family Jul 2 00:44:22.984467 kernel: Key type dns_resolver registered Jul 2 00:44:22.984504 kernel: registered taskstats version 1 Jul 2 00:44:22.984521 kernel: Loading compiled-in X.509 certificates Jul 2 00:44:22.984537 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 00:44:22.984553 kernel: Key type .fscrypt registered Jul 2 00:44:22.984569 kernel: Key type fscrypt-provisioning registered Jul 2 00:44:22.984585 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 00:44:22.984601 kernel: ima: Allocated hash algorithm: sha1 Jul 2 00:44:22.984623 kernel: ima: No architecture policies found Jul 2 00:44:22.984639 kernel: clk: Disabling unused clocks Jul 2 00:44:22.984655 kernel: Freeing unused kernel memory: 36352K Jul 2 00:44:22.984671 kernel: Run /init as init process Jul 2 00:44:22.984687 kernel: with arguments: Jul 2 00:44:22.984703 kernel: /init Jul 2 00:44:22.984719 kernel: with environment: Jul 2 00:44:22.984735 kernel: HOME=/ Jul 2 00:44:22.984751 kernel: TERM=linux Jul 2 00:44:22.984771 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 00:44:22.984792 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:44:22.984813 systemd[1]: Detected virtualization amazon. Jul 2 00:44:22.984831 systemd[1]: Detected architecture arm64. Jul 2 00:44:22.984848 systemd[1]: Running in initrd. Jul 2 00:44:22.984866 systemd[1]: No hostname configured, using default hostname. Jul 2 00:44:22.984883 systemd[1]: Hostname set to . Jul 2 00:44:22.984905 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:44:22.984923 systemd[1]: Queued start job for default target initrd.target. Jul 2 00:44:22.984941 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:44:22.984958 systemd[1]: Reached target cryptsetup.target. Jul 2 00:44:22.984976 systemd[1]: Reached target paths.target. Jul 2 00:44:22.984993 systemd[1]: Reached target slices.target. Jul 2 00:44:22.985010 systemd[1]: Reached target swap.target. Jul 2 00:44:22.985027 systemd[1]: Reached target timers.target. Jul 2 00:44:22.985050 systemd[1]: Listening on iscsid.socket. Jul 2 00:44:22.985068 systemd[1]: Listening on iscsiuio.socket. Jul 2 00:44:22.985085 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 00:44:22.985103 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 00:44:22.985121 systemd[1]: Listening on systemd-journald.socket. Jul 2 00:44:22.985139 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:44:22.985156 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:44:22.985174 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:44:22.985196 systemd[1]: Reached target sockets.target. Jul 2 00:44:22.985214 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:44:22.985231 systemd[1]: Finished network-cleanup.service. Jul 2 00:44:22.985249 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 00:44:22.985267 systemd[1]: Starting systemd-journald.service... Jul 2 00:44:22.985284 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:44:22.985302 systemd[1]: Starting systemd-resolved.service... Jul 2 00:44:22.985320 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 00:44:22.985337 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:44:22.985362 systemd-journald[309]: Journal started Jul 2 00:44:22.985461 systemd-journald[309]: Runtime Journal (/run/log/journal/ec22f426266dbdf34c7cfb056cfd73a3) is 8.0M, max 75.4M, 67.4M free. Jul 2 00:44:22.945996 systemd-modules-load[310]: Inserted module 'overlay' Jul 2 00:44:23.021313 kernel: audit: type=1130 audit(1719881062.986:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.021352 systemd[1]: Started systemd-journald.service. Jul 2 00:44:23.021380 kernel: audit: type=1130 audit(1719881062.998:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.021404 kernel: audit: type=1130 audit(1719881063.007:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:22.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:22.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.000014 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 00:44:23.009360 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 00:44:23.014785 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 00:44:23.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.036134 kernel: audit: type=1130 audit(1719881063.011:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.043726 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 00:44:23.065484 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 00:44:23.073480 kernel: Bridge firewalling registered Jul 2 00:44:23.073484 systemd-modules-load[310]: Inserted module 'br_netfilter' Jul 2 00:44:23.077591 systemd-resolved[311]: Positive Trust Anchors: Jul 2 00:44:23.079818 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:44:23.081045 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:44:23.107583 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 00:44:23.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.126249 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 00:44:23.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.140342 kernel: audit: type=1130 audit(1719881063.113:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.140411 kernel: audit: type=1130 audit(1719881063.128:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.145715 systemd[1]: Starting dracut-cmdline.service... Jul 2 00:44:23.163478 kernel: SCSI subsystem initialized Jul 2 00:44:23.174042 dracut-cmdline[325]: dracut-dracut-053 Jul 2 00:44:23.185473 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 00:44:23.185543 kernel: device-mapper: uevent: version 1.0.3 Jul 2 00:44:23.185576 dracut-cmdline[325]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:44:23.211027 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 00:44:23.218804 systemd-modules-load[310]: Inserted module 'dm_multipath' Jul 2 00:44:23.224115 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:44:23.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.233639 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:44:23.240181 kernel: audit: type=1130 audit(1719881063.222:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.267690 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:44:23.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.284856 kernel: audit: type=1130 audit(1719881063.272:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.353480 kernel: Loading iSCSI transport class v2.0-870. Jul 2 00:44:23.373484 kernel: iscsi: registered transport (tcp) Jul 2 00:44:23.399992 kernel: iscsi: registered transport (qla4xxx) Jul 2 00:44:23.400089 kernel: QLogic iSCSI HBA Driver Jul 2 00:44:23.602110 systemd-resolved[311]: Defaulting to hostname 'linux'. Jul 2 00:44:23.606362 kernel: random: crng init done Jul 2 00:44:23.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.607980 systemd[1]: Started systemd-resolved.service. Jul 2 00:44:23.624858 kernel: audit: type=1130 audit(1719881063.610:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.611843 systemd[1]: Reached target nss-lookup.target. Jul 2 00:44:23.629834 systemd[1]: Finished dracut-cmdline.service. Jul 2 00:44:23.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:23.635016 systemd[1]: Starting dracut-pre-udev.service... Jul 2 00:44:23.701478 kernel: raid6: neonx8 gen() 6200 MB/s Jul 2 00:44:23.719479 kernel: raid6: neonx8 xor() 4748 MB/s Jul 2 00:44:23.737469 kernel: raid6: neonx4 gen() 6536 MB/s Jul 2 00:44:23.755477 kernel: raid6: neonx4 xor() 4965 MB/s Jul 2 00:44:23.773470 kernel: raid6: neonx2 gen() 5784 MB/s Jul 2 00:44:23.791477 kernel: raid6: neonx2 xor() 4551 MB/s Jul 2 00:44:23.809490 kernel: raid6: neonx1 gen() 4453 MB/s Jul 2 00:44:23.827474 kernel: raid6: neonx1 xor() 3683 MB/s Jul 2 00:44:23.845473 kernel: raid6: int64x8 gen() 3429 MB/s Jul 2 00:44:23.863474 kernel: raid6: int64x8 xor() 2081 MB/s Jul 2 00:44:23.881473 kernel: raid6: int64x4 gen() 3826 MB/s Jul 2 00:44:23.899473 kernel: raid6: int64x4 xor() 2191 MB/s Jul 2 00:44:23.917473 kernel: raid6: int64x2 gen() 3597 MB/s Jul 2 00:44:23.935474 kernel: raid6: int64x2 xor() 1938 MB/s Jul 2 00:44:23.953473 kernel: raid6: int64x1 gen() 2755 MB/s Jul 2 00:44:23.972388 kernel: raid6: int64x1 xor() 1444 MB/s Jul 2 00:44:23.972417 kernel: raid6: using algorithm neonx4 gen() 6536 MB/s Jul 2 00:44:23.972456 kernel: raid6: .... xor() 4965 MB/s, rmw enabled Jul 2 00:44:23.973921 kernel: raid6: using neon recovery algorithm Jul 2 00:44:23.992485 kernel: xor: measuring software checksum speed Jul 2 00:44:23.994478 kernel: 8regs : 9332 MB/sec Jul 2 00:44:23.996477 kernel: 32regs : 11111 MB/sec Jul 2 00:44:24.000094 kernel: arm64_neon : 9616 MB/sec Jul 2 00:44:24.000126 kernel: xor: using function: 32regs (11111 MB/sec) Jul 2 00:44:24.090491 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 00:44:24.107782 systemd[1]: Finished dracut-pre-udev.service. Jul 2 00:44:24.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:24.112000 audit: BPF prog-id=7 op=LOAD Jul 2 00:44:24.112000 audit: BPF prog-id=8 op=LOAD Jul 2 00:44:24.114379 systemd[1]: Starting systemd-udevd.service... Jul 2 00:44:24.143663 systemd-udevd[509]: Using default interface naming scheme 'v252'. Jul 2 00:44:24.152871 systemd[1]: Started systemd-udevd.service. Jul 2 00:44:24.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:24.164520 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 00:44:24.192748 dracut-pre-trigger[528]: rd.md=0: removing MD RAID activation Jul 2 00:44:24.254151 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 00:44:24.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:24.257534 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:44:24.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:24.364070 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:44:24.494351 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 2 00:44:24.494430 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Jul 2 00:44:24.502378 kernel: ena 0000:00:05.0: ENA device version: 0.10 Jul 2 00:44:24.502684 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Jul 2 00:44:24.507483 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Jul 2 00:44:24.509596 kernel: nvme nvme0: pci function 0000:00:04.0 Jul 2 00:44:24.514483 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:6c:ec:3e:f3:91 Jul 2 00:44:24.519496 kernel: nvme nvme0: 2/0/0 default/read/poll queues Jul 2 00:44:24.525425 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 00:44:24.525495 kernel: GPT:9289727 != 16777215 Jul 2 00:44:24.525521 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 00:44:24.528479 kernel: GPT:9289727 != 16777215 Jul 2 00:44:24.528509 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 00:44:24.531383 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 00:44:24.534120 (udev-worker)[559]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:44:24.632515 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (574) Jul 2 00:44:24.648138 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 00:44:24.688259 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:44:24.736681 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 00:44:24.744580 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 00:44:24.769312 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 00:44:24.783655 systemd[1]: Starting disk-uuid.service... Jul 2 00:44:24.795504 disk-uuid[674]: Primary Header is updated. Jul 2 00:44:24.795504 disk-uuid[674]: Secondary Entries is updated. Jul 2 00:44:24.795504 disk-uuid[674]: Secondary Header is updated. Jul 2 00:44:24.805489 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 00:44:24.814483 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 00:44:25.819514 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 00:44:25.820312 disk-uuid[675]: The operation has completed successfully. Jul 2 00:44:25.977610 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 00:44:25.978158 systemd[1]: Finished disk-uuid.service. Jul 2 00:44:25.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:25.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:26.013912 systemd[1]: Starting verity-setup.service... Jul 2 00:44:26.053496 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 00:44:26.135977 systemd[1]: Found device dev-mapper-usr.device. Jul 2 00:44:26.144036 systemd[1]: Mounting sysusr-usr.mount... Jul 2 00:44:26.150640 systemd[1]: Finished verity-setup.service. Jul 2 00:44:26.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:26.234474 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:44:26.234989 systemd[1]: Mounted sysusr-usr.mount. Jul 2 00:44:26.240132 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 00:44:26.245276 systemd[1]: Starting ignition-setup.service... Jul 2 00:44:26.254103 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 00:44:26.278975 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:44:26.279035 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 00:44:26.280918 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 00:44:26.293481 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 00:44:26.309769 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 00:44:26.333957 systemd[1]: Finished ignition-setup.service. Jul 2 00:44:26.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:26.341498 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 00:44:26.402825 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 00:44:26.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:26.407000 audit: BPF prog-id=9 op=LOAD Jul 2 00:44:26.409496 systemd[1]: Starting systemd-networkd.service... Jul 2 00:44:26.454505 systemd-networkd[1104]: lo: Link UP Jul 2 00:44:26.455320 systemd-networkd[1104]: lo: Gained carrier Jul 2 00:44:26.457645 systemd-networkd[1104]: Enumeration completed Jul 2 00:44:26.458120 systemd-networkd[1104]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:44:26.463623 systemd[1]: Started systemd-networkd.service. Jul 2 00:44:26.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:26.471710 systemd[1]: Reached target network.target. Jul 2 00:44:26.475928 systemd-networkd[1104]: eth0: Link UP Jul 2 00:44:26.475937 systemd-networkd[1104]: eth0: Gained carrier Jul 2 00:44:26.483344 systemd[1]: Starting iscsiuio.service... Jul 2 00:44:26.497015 systemd[1]: Started iscsiuio.service. Jul 2 00:44:26.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:26.497611 systemd-networkd[1104]: eth0: DHCPv4 address 172.31.27.140/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 2 00:44:26.507946 systemd[1]: Starting iscsid.service... Jul 2 00:44:26.514038 iscsid[1109]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:44:26.514038 iscsid[1109]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 00:44:26.514038 iscsid[1109]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 00:44:26.514038 iscsid[1109]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 00:44:26.514038 iscsid[1109]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 00:44:26.514038 iscsid[1109]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:44:26.514038 iscsid[1109]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 00:44:26.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:26.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:26.518599 systemd[1]: Started iscsid.service. Jul 2 00:44:26.534914 systemd[1]: Starting dracut-initqueue.service... Jul 2 00:44:26.563922 systemd[1]: Finished dracut-initqueue.service. Jul 2 00:44:26.566700 systemd[1]: Reached target remote-fs-pre.target. Jul 2 00:44:26.589990 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:44:26.592480 systemd[1]: Reached target remote-fs.target. Jul 2 00:44:26.604621 systemd[1]: Starting dracut-pre-mount.service... Jul 2 00:44:26.622796 systemd[1]: Finished dracut-pre-mount.service. Jul 2 00:44:26.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.417746 ignition[1052]: Ignition 2.14.0 Jul 2 00:44:27.418216 ignition[1052]: Stage: fetch-offline Jul 2 00:44:27.418557 ignition[1052]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:44:27.418624 ignition[1052]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:44:27.440302 ignition[1052]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:44:27.443206 ignition[1052]: Ignition finished successfully Jul 2 00:44:27.456484 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 2 00:44:27.456557 kernel: audit: type=1130 audit(1719881067.448:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.446872 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 00:44:27.450583 systemd[1]: Starting ignition-fetch.service... Jul 2 00:44:27.470762 ignition[1128]: Ignition 2.14.0 Jul 2 00:44:27.472603 ignition[1128]: Stage: fetch Jul 2 00:44:27.474205 ignition[1128]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:44:27.476780 ignition[1128]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:44:27.487459 ignition[1128]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:44:27.490218 ignition[1128]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:44:27.500104 ignition[1128]: INFO : PUT result: OK Jul 2 00:44:27.503774 ignition[1128]: DEBUG : parsed url from cmdline: "" Jul 2 00:44:27.505897 ignition[1128]: INFO : no config URL provided Jul 2 00:44:27.507842 ignition[1128]: INFO : reading system config file "/usr/lib/ignition/user.ign" Jul 2 00:44:27.510485 ignition[1128]: INFO : no config at "/usr/lib/ignition/user.ign" Jul 2 00:44:27.510485 ignition[1128]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:44:27.515704 ignition[1128]: INFO : PUT result: OK Jul 2 00:44:27.517544 ignition[1128]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Jul 2 00:44:27.521106 ignition[1128]: INFO : GET result: OK Jul 2 00:44:27.531812 ignition[1128]: DEBUG : parsing config with SHA512: 96384702facb09e7bfa77d2924b4f349315d888b86047edc348519aa9b289f7bbef29676d417dd1dad0aac51f9abdca711e9d2d35657de38199501033dda9c44 Jul 2 00:44:27.542228 unknown[1128]: fetched base config from "system" Jul 2 00:44:27.542489 unknown[1128]: fetched base config from "system" Jul 2 00:44:27.544087 ignition[1128]: fetch: fetch complete Jul 2 00:44:27.542506 unknown[1128]: fetched user config from "aws" Jul 2 00:44:27.544100 ignition[1128]: fetch: fetch passed Jul 2 00:44:27.544193 ignition[1128]: Ignition finished successfully Jul 2 00:44:27.555806 systemd[1]: Finished ignition-fetch.service. Jul 2 00:44:27.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.570031 systemd[1]: Starting ignition-kargs.service... Jul 2 00:44:27.582108 kernel: audit: type=1130 audit(1719881067.567:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.591926 ignition[1134]: Ignition 2.14.0 Jul 2 00:44:27.591956 ignition[1134]: Stage: kargs Jul 2 00:44:27.592253 ignition[1134]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:44:27.592311 ignition[1134]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:44:27.606382 ignition[1134]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:44:27.609135 ignition[1134]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:44:27.612596 ignition[1134]: INFO : PUT result: OK Jul 2 00:44:27.617900 ignition[1134]: kargs: kargs passed Jul 2 00:44:27.618019 ignition[1134]: Ignition finished successfully Jul 2 00:44:27.623102 systemd[1]: Finished ignition-kargs.service. Jul 2 00:44:27.628383 systemd[1]: Starting ignition-disks.service... Jul 2 00:44:27.638598 kernel: audit: type=1130 audit(1719881067.625:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.650732 ignition[1140]: Ignition 2.14.0 Jul 2 00:44:27.650761 ignition[1140]: Stage: disks Jul 2 00:44:27.651070 ignition[1140]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:44:27.651132 ignition[1140]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:44:27.667309 ignition[1140]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:44:27.670063 ignition[1140]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:44:27.673597 ignition[1140]: INFO : PUT result: OK Jul 2 00:44:27.679319 ignition[1140]: disks: disks passed Jul 2 00:44:27.679426 ignition[1140]: Ignition finished successfully Jul 2 00:44:27.683970 systemd[1]: Finished ignition-disks.service. Jul 2 00:44:27.687637 systemd[1]: Reached target initrd-root-device.target. Jul 2 00:44:27.697643 kernel: audit: type=1130 audit(1719881067.686:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.697660 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:44:27.699584 systemd[1]: Reached target local-fs.target. Jul 2 00:44:27.701356 systemd[1]: Reached target sysinit.target. Jul 2 00:44:27.703089 systemd[1]: Reached target basic.target. Jul 2 00:44:27.703709 systemd-networkd[1104]: eth0: Gained IPv6LL Jul 2 00:44:27.706388 systemd[1]: Starting systemd-fsck-root.service... Jul 2 00:44:27.757813 systemd-fsck[1148]: ROOT: clean, 614/553520 files, 56019/553472 blocks Jul 2 00:44:27.767157 systemd[1]: Finished systemd-fsck-root.service. Jul 2 00:44:27.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.778070 systemd[1]: Mounting sysroot.mount... Jul 2 00:44:27.782438 kernel: audit: type=1130 audit(1719881067.765:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:27.795494 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 00:44:27.797582 systemd[1]: Mounted sysroot.mount. Jul 2 00:44:27.800828 systemd[1]: Reached target initrd-root-fs.target. Jul 2 00:44:27.819940 systemd[1]: Mounting sysroot-usr.mount... Jul 2 00:44:27.827846 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 00:44:27.827941 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 00:44:27.828097 systemd[1]: Reached target ignition-diskful.target. Jul 2 00:44:27.834741 systemd[1]: Mounted sysroot-usr.mount. Jul 2 00:44:27.864688 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 00:44:27.870345 systemd[1]: Starting initrd-setup-root.service... Jul 2 00:44:27.889467 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1165) Jul 2 00:44:27.892909 initrd-setup-root[1170]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 00:44:27.897747 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:44:27.897787 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 00:44:27.897811 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 00:44:27.907487 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 00:44:27.912171 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 00:44:27.918356 initrd-setup-root[1196]: cut: /sysroot/etc/group: No such file or directory Jul 2 00:44:27.927791 initrd-setup-root[1204]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 00:44:27.936999 initrd-setup-root[1212]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 00:44:28.199978 systemd[1]: Finished initrd-setup-root.service. Jul 2 00:44:28.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:28.204977 systemd[1]: Starting ignition-mount.service... Jul 2 00:44:28.213708 kernel: audit: type=1130 audit(1719881068.202:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:28.214892 systemd[1]: Starting sysroot-boot.service... Jul 2 00:44:28.229605 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 00:44:28.231955 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 00:44:28.262006 systemd[1]: Finished sysroot-boot.service. Jul 2 00:44:28.267829 ignition[1233]: INFO : Ignition 2.14.0 Jul 2 00:44:28.267829 ignition[1233]: INFO : Stage: mount Jul 2 00:44:28.267829 ignition[1233]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:44:28.267829 ignition[1233]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:44:28.286088 kernel: audit: type=1130 audit(1719881068.266:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:28.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:28.295373 ignition[1233]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:44:28.298348 ignition[1233]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:44:28.302065 ignition[1233]: INFO : PUT result: OK Jul 2 00:44:28.307200 ignition[1233]: INFO : mount: mount passed Jul 2 00:44:28.309198 ignition[1233]: INFO : Ignition finished successfully Jul 2 00:44:28.312495 systemd[1]: Finished ignition-mount.service. Jul 2 00:44:28.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:28.316881 systemd[1]: Starting ignition-files.service... Jul 2 00:44:28.333485 kernel: audit: type=1130 audit(1719881068.313:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:28.340356 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 00:44:28.358477 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1240) Jul 2 00:44:28.364088 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:44:28.364135 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 00:44:28.366001 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 00:44:28.372469 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 00:44:28.377062 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 00:44:28.396176 ignition[1259]: INFO : Ignition 2.14.0 Jul 2 00:44:28.398276 ignition[1259]: INFO : Stage: files Jul 2 00:44:28.400151 ignition[1259]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:44:28.402952 ignition[1259]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:44:28.417856 ignition[1259]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:44:28.421085 ignition[1259]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:44:28.424305 ignition[1259]: INFO : PUT result: OK Jul 2 00:44:28.429558 ignition[1259]: DEBUG : files: compiled without relabeling support, skipping Jul 2 00:44:28.433904 ignition[1259]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 00:44:28.433904 ignition[1259]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 00:44:28.488777 ignition[1259]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 00:44:28.492086 ignition[1259]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 00:44:28.495783 unknown[1259]: wrote ssh authorized keys file for user: core Jul 2 00:44:28.498390 ignition[1259]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 00:44:28.502479 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 00:44:28.506912 ignition[1259]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Jul 2 00:44:28.570725 ignition[1259]: INFO : GET result: OK Jul 2 00:44:28.709941 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 00:44:28.715347 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 2 00:44:28.715347 ignition[1259]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 00:44:28.732683 ignition[1259]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem122956191" Jul 2 00:44:28.740231 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1261) Jul 2 00:44:28.740284 ignition[1259]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem122956191": device or resource busy Jul 2 00:44:28.740284 ignition[1259]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem122956191", trying btrfs: device or resource busy Jul 2 00:44:28.740284 ignition[1259]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem122956191" Jul 2 00:44:28.751263 ignition[1259]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem122956191" Jul 2 00:44:28.765328 ignition[1259]: INFO : op(3): [started] unmounting "/mnt/oem122956191" Jul 2 00:44:28.772542 ignition[1259]: INFO : op(3): [finished] unmounting "/mnt/oem122956191" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 00:44:28.776373 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 2 00:44:28.776373 ignition[1259]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 00:44:28.854193 ignition[1259]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3793470447" Jul 2 00:44:28.857677 ignition[1259]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3793470447": device or resource busy Jul 2 00:44:28.861437 ignition[1259]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3793470447", trying btrfs: device or resource busy Jul 2 00:44:28.861437 ignition[1259]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3793470447" Jul 2 00:44:28.871482 ignition[1259]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3793470447" Jul 2 00:44:28.871482 ignition[1259]: INFO : op(6): [started] unmounting "/mnt/oem3793470447" Jul 2 00:44:28.871482 ignition[1259]: INFO : op(6): [finished] unmounting "/mnt/oem3793470447" Jul 2 00:44:28.871482 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 2 00:44:28.871482 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 2 00:44:28.871482 ignition[1259]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 00:44:28.884672 systemd[1]: mnt-oem3793470447.mount: Deactivated successfully. Jul 2 00:44:28.906308 ignition[1259]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3929984091" Jul 2 00:44:28.909757 ignition[1259]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3929984091": device or resource busy Jul 2 00:44:28.909757 ignition[1259]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3929984091", trying btrfs: device or resource busy Jul 2 00:44:28.919571 ignition[1259]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3929984091" Jul 2 00:44:28.922212 ignition[1259]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3929984091" Jul 2 00:44:28.922212 ignition[1259]: INFO : op(9): [started] unmounting "/mnt/oem3929984091" Jul 2 00:44:28.928289 systemd[1]: mnt-oem3929984091.mount: Deactivated successfully. Jul 2 00:44:28.932968 ignition[1259]: INFO : op(9): [finished] unmounting "/mnt/oem3929984091" Jul 2 00:44:28.935829 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 2 00:44:28.943002 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 00:44:28.953866 ignition[1259]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 00:44:28.967277 ignition[1259]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2719818343" Jul 2 00:44:28.970861 ignition[1259]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2719818343": device or resource busy Jul 2 00:44:28.970861 ignition[1259]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2719818343", trying btrfs: device or resource busy Jul 2 00:44:28.970861 ignition[1259]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2719818343" Jul 2 00:44:28.985219 ignition[1259]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2719818343" Jul 2 00:44:28.985219 ignition[1259]: INFO : op(c): [started] unmounting "/mnt/oem2719818343" Jul 2 00:44:28.985219 ignition[1259]: INFO : op(c): [finished] unmounting "/mnt/oem2719818343" Jul 2 00:44:28.985219 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 00:44:28.985219 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 00:44:28.985219 ignition[1259]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Jul 2 00:44:29.432427 ignition[1259]: INFO : GET result: OK Jul 2 00:44:30.018372 ignition[1259]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(12): [started] processing unit "nvidia.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(12): [finished] processing unit "nvidia.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Jul 2 00:44:30.023609 ignition[1259]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 00:44:30.056244 ignition[1259]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 00:44:30.056244 ignition[1259]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Jul 2 00:44:30.063270 ignition[1259]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" Jul 2 00:44:30.066576 ignition[1259]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 00:44:30.066576 ignition[1259]: INFO : files: op(16): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 00:44:30.073128 ignition[1259]: INFO : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 00:44:30.073128 ignition[1259]: INFO : files: op(17): [started] setting preset to enabled for "amazon-ssm-agent.service" Jul 2 00:44:30.079816 ignition[1259]: INFO : files: op(17): [finished] setting preset to enabled for "amazon-ssm-agent.service" Jul 2 00:44:30.079816 ignition[1259]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Jul 2 00:44:30.085740 ignition[1259]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Jul 2 00:44:30.095861 ignition[1259]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:44:30.099942 ignition[1259]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:44:30.103748 ignition[1259]: INFO : files: files passed Jul 2 00:44:30.105507 ignition[1259]: INFO : Ignition finished successfully Jul 2 00:44:30.110114 systemd[1]: Finished ignition-files.service. Jul 2 00:44:30.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.121512 kernel: audit: type=1130 audit(1719881070.113:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.124556 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 00:44:30.126916 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 00:44:30.128434 systemd[1]: Starting ignition-quench.service... Jul 2 00:44:30.144584 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 00:44:30.145248 systemd[1]: Finished ignition-quench.service. Jul 2 00:44:30.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.157488 kernel: audit: type=1130 audit(1719881070.147:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.162552 initrd-setup-root-after-ignition[1284]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 00:44:30.167262 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 00:44:30.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.171688 systemd[1]: Reached target ignition-complete.target. Jul 2 00:44:30.174930 systemd[1]: Starting initrd-parse-etc.service... Jul 2 00:44:30.209553 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 00:44:30.209934 systemd[1]: Finished initrd-parse-etc.service. Jul 2 00:44:30.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.216172 systemd[1]: Reached target initrd-fs.target. Jul 2 00:44:30.219597 systemd[1]: Reached target initrd.target. Jul 2 00:44:30.222886 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 00:44:30.236818 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 00:44:30.261535 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 00:44:30.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.266524 systemd[1]: Starting initrd-cleanup.service... Jul 2 00:44:30.287840 systemd[1]: Stopped target nss-lookup.target. Jul 2 00:44:30.291869 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 00:44:30.295920 systemd[1]: Stopped target timers.target. Jul 2 00:44:30.299296 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 00:44:30.301700 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 00:44:30.305404 systemd[1]: Stopped target initrd.target. Jul 2 00:44:30.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.308887 systemd[1]: Stopped target basic.target. Jul 2 00:44:30.312277 systemd[1]: Stopped target ignition-complete.target. Jul 2 00:44:30.316213 systemd[1]: Stopped target ignition-diskful.target. Jul 2 00:44:30.320087 systemd[1]: Stopped target initrd-root-device.target. Jul 2 00:44:30.324080 systemd[1]: Stopped target remote-fs.target. Jul 2 00:44:30.327611 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 00:44:30.331355 systemd[1]: Stopped target sysinit.target. Jul 2 00:44:30.334808 systemd[1]: Stopped target local-fs.target. Jul 2 00:44:30.338250 systemd[1]: Stopped target local-fs-pre.target. Jul 2 00:44:30.341947 systemd[1]: Stopped target swap.target. Jul 2 00:44:30.345178 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 00:44:30.347574 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 00:44:30.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.351324 systemd[1]: Stopped target cryptsetup.target. Jul 2 00:44:30.354915 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 00:44:30.357249 systemd[1]: Stopped dracut-initqueue.service. Jul 2 00:44:30.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.360983 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 00:44:30.363695 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 00:44:30.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.368135 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 00:44:30.370475 systemd[1]: Stopped ignition-files.service. Jul 2 00:44:30.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.375407 systemd[1]: Stopping ignition-mount.service... Jul 2 00:44:30.406636 ignition[1297]: INFO : Ignition 2.14.0 Jul 2 00:44:30.406636 ignition[1297]: INFO : Stage: umount Jul 2 00:44:30.406636 ignition[1297]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:44:30.406636 ignition[1297]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:44:30.406636 ignition[1297]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:44:30.406636 ignition[1297]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:44:30.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.402575 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 00:44:30.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.442590 ignition[1297]: INFO : PUT result: OK Jul 2 00:44:30.402852 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 00:44:30.412715 systemd[1]: Stopping sysroot-boot.service... Jul 2 00:44:30.437828 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 00:44:30.438142 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 00:44:30.440549 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 00:44:30.440811 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 00:44:30.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.463239 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 00:44:30.467578 ignition[1297]: INFO : umount: umount passed Jul 2 00:44:30.467578 ignition[1297]: INFO : Ignition finished successfully Jul 2 00:44:30.473130 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 00:44:30.488544 systemd[1]: Finished initrd-cleanup.service. Jul 2 00:44:30.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.492692 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 00:44:30.495076 systemd[1]: Stopped ignition-mount.service. Jul 2 00:44:30.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.498782 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 00:44:30.498892 systemd[1]: Stopped ignition-disks.service. Jul 2 00:44:30.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.505940 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 00:44:30.506037 systemd[1]: Stopped ignition-kargs.service. Jul 2 00:44:30.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.511374 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 00:44:30.511469 systemd[1]: Stopped ignition-fetch.service. Jul 2 00:44:30.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.516973 systemd[1]: Stopped target network.target. Jul 2 00:44:30.520216 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 00:44:30.520330 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 00:44:30.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.526522 systemd[1]: Stopped target paths.target. Jul 2 00:44:30.529597 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 00:44:30.534495 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 00:44:30.538374 systemd[1]: Stopped target slices.target. Jul 2 00:44:30.541599 systemd[1]: Stopped target sockets.target. Jul 2 00:44:30.544960 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 00:44:30.545037 systemd[1]: Closed iscsid.socket. Jul 2 00:44:30.549769 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 00:44:30.549841 systemd[1]: Closed iscsiuio.socket. Jul 2 00:44:30.553201 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 00:44:30.556804 systemd[1]: Stopped ignition-setup.service. Jul 2 00:44:30.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.560461 systemd[1]: Stopping systemd-networkd.service... Jul 2 00:44:30.564144 systemd[1]: Stopping systemd-resolved.service... Jul 2 00:44:30.564503 systemd-networkd[1104]: eth0: DHCPv6 lease lost Jul 2 00:44:30.569992 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 00:44:30.572269 systemd[1]: Stopped sysroot-boot.service. Jul 2 00:44:30.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.578157 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 00:44:30.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.598000 audit: BPF prog-id=9 op=UNLOAD Jul 2 00:44:30.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.578366 systemd[1]: Stopped systemd-resolved.service. Jul 2 00:44:30.582262 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 00:44:30.619000 audit: BPF prog-id=6 op=UNLOAD Jul 2 00:44:30.582471 systemd[1]: Stopped systemd-networkd.service. Jul 2 00:44:30.584760 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 00:44:30.584828 systemd[1]: Closed systemd-networkd.socket. Jul 2 00:44:30.586670 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 00:44:30.586751 systemd[1]: Stopped initrd-setup-root.service. Jul 2 00:44:30.589802 systemd[1]: Stopping network-cleanup.service... Jul 2 00:44:30.592319 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 00:44:30.592486 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 00:44:30.594712 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 00:44:30.595980 systemd[1]: Stopped systemd-sysctl.service. Jul 2 00:44:30.599006 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 00:44:30.599100 systemd[1]: Stopped systemd-modules-load.service. Jul 2 00:44:30.607609 systemd[1]: Stopping systemd-udevd.service... Jul 2 00:44:30.611969 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 00:44:30.653026 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 00:44:30.655377 systemd[1]: Stopped systemd-udevd.service. Jul 2 00:44:30.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.659382 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 00:44:30.661771 systemd[1]: Stopped network-cleanup.service. Jul 2 00:44:30.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.665483 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 00:44:30.665592 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 00:44:30.671512 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 00:44:30.671598 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 00:44:30.677520 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 00:44:30.677617 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 00:44:30.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.683231 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 00:44:30.683335 systemd[1]: Stopped dracut-cmdline.service. Jul 2 00:44:30.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.688893 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 00:44:30.688997 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 00:44:30.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.696187 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 00:44:30.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.698553 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 00:44:30.698664 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 00:44:30.719799 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 00:44:30.720012 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 00:44:30.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:30.724624 systemd[1]: Reached target initrd-switch-root.target. Jul 2 00:44:30.727857 systemd[1]: Starting initrd-switch-root.service... Jul 2 00:44:30.748555 systemd[1]: Switching root. Jul 2 00:44:30.777355 iscsid[1109]: iscsid shutting down. Jul 2 00:44:30.779366 systemd-journald[309]: Received SIGTERM from PID 1 (systemd). Jul 2 00:44:30.779476 systemd-journald[309]: Journal stopped Jul 2 00:44:37.011985 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 00:44:37.012160 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 00:44:37.012231 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 00:44:37.012265 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 00:44:37.012298 kernel: SELinux: policy capability open_perms=1 Jul 2 00:44:37.012347 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 00:44:37.012424 kernel: SELinux: policy capability always_check_network=0 Jul 2 00:44:37.012480 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 00:44:37.012515 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 00:44:37.012553 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 00:44:37.012586 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 00:44:37.012625 systemd[1]: Successfully loaded SELinux policy in 139.110ms. Jul 2 00:44:37.012685 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.147ms. Jul 2 00:44:37.012722 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:44:37.012757 systemd[1]: Detected virtualization amazon. Jul 2 00:44:37.012787 systemd[1]: Detected architecture arm64. Jul 2 00:44:37.012819 systemd[1]: Detected first boot. Jul 2 00:44:37.012854 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:44:37.012888 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 00:44:37.012920 systemd[1]: Populated /etc with preset unit settings. Jul 2 00:44:37.012952 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:44:37.012988 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:44:37.013023 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:44:37.013056 kernel: kauditd_printk_skb: 54 callbacks suppressed Jul 2 00:44:37.013090 kernel: audit: type=1334 audit(1719881076.622:86): prog-id=12 op=LOAD Jul 2 00:44:37.013121 kernel: audit: type=1334 audit(1719881076.622:87): prog-id=3 op=UNLOAD Jul 2 00:44:37.015002 kernel: audit: type=1334 audit(1719881076.623:88): prog-id=13 op=LOAD Jul 2 00:44:37.015933 kernel: audit: type=1334 audit(1719881076.625:89): prog-id=14 op=LOAD Jul 2 00:44:37.016350 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 00:44:37.016772 kernel: audit: type=1334 audit(1719881076.625:90): prog-id=4 op=UNLOAD Jul 2 00:44:37.016958 systemd[1]: Stopped iscsiuio.service. Jul 2 00:44:37.016997 kernel: audit: type=1334 audit(1719881076.626:91): prog-id=5 op=UNLOAD Jul 2 00:44:37.017036 kernel: audit: type=1131 audit(1719881076.630:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.017070 kernel: audit: type=1334 audit(1719881076.646:93): prog-id=12 op=UNLOAD Jul 2 00:44:37.017137 kernel: audit: type=1131 audit(1719881076.650:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.017171 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 00:44:37.017203 systemd[1]: Stopped iscsid.service. Jul 2 00:44:37.017235 kernel: audit: type=1131 audit(1719881076.662:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.017266 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 00:44:37.017314 systemd[1]: Stopped initrd-switch-root.service. Jul 2 00:44:37.017350 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 00:44:37.017384 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 00:44:37.017415 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 00:44:37.017476 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 00:44:37.017509 systemd[1]: Created slice system-getty.slice. Jul 2 00:44:37.017540 systemd[1]: Created slice system-modprobe.slice. Jul 2 00:44:37.017582 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 00:44:37.017624 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 00:44:37.017658 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 00:44:37.017691 systemd[1]: Created slice user.slice. Jul 2 00:44:37.017726 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:44:37.017756 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 00:44:37.017786 systemd[1]: Set up automount boot.automount. Jul 2 00:44:37.017818 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 00:44:37.017848 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 00:44:37.017882 systemd[1]: Stopped target initrd-fs.target. Jul 2 00:44:37.017923 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 00:44:37.017957 systemd[1]: Reached target integritysetup.target. Jul 2 00:44:37.017989 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:44:37.018021 systemd[1]: Reached target remote-fs.target. Jul 2 00:44:37.018051 systemd[1]: Reached target slices.target. Jul 2 00:44:37.018082 systemd[1]: Reached target swap.target. Jul 2 00:44:37.018112 systemd[1]: Reached target torcx.target. Jul 2 00:44:37.018143 systemd[1]: Reached target veritysetup.target. Jul 2 00:44:37.018173 systemd[1]: Listening on systemd-coredump.socket. Jul 2 00:44:37.018207 systemd[1]: Listening on systemd-initctl.socket. Jul 2 00:44:37.018239 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:44:37.018269 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:44:37.018303 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:44:37.018333 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 00:44:37.018365 systemd[1]: Mounting dev-hugepages.mount... Jul 2 00:44:37.018394 systemd[1]: Mounting dev-mqueue.mount... Jul 2 00:44:37.018426 systemd[1]: Mounting media.mount... Jul 2 00:44:37.018473 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 00:44:37.018509 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 00:44:37.018543 systemd[1]: Mounting tmp.mount... Jul 2 00:44:37.018575 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 00:44:37.018608 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:44:37.018638 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:44:37.018671 systemd[1]: Starting modprobe@configfs.service... Jul 2 00:44:37.018702 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:44:37.018732 systemd[1]: Starting modprobe@drm.service... Jul 2 00:44:37.018762 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:44:37.018794 systemd[1]: Starting modprobe@fuse.service... Jul 2 00:44:37.018828 systemd[1]: Starting modprobe@loop.service... Jul 2 00:44:37.018859 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 00:44:37.018890 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 00:44:37.018919 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 00:44:37.018951 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 00:44:37.018987 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 00:44:37.019019 systemd[1]: Stopped systemd-journald.service. Jul 2 00:44:37.019048 systemd[1]: Starting systemd-journald.service... Jul 2 00:44:37.019077 kernel: loop: module loaded Jul 2 00:44:37.019110 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:44:37.019139 kernel: fuse: init (API version 7.34) Jul 2 00:44:37.019168 systemd[1]: Starting systemd-network-generator.service... Jul 2 00:44:37.019200 systemd[1]: Starting systemd-remount-fs.service... Jul 2 00:44:37.019230 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:44:37.019263 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 00:44:37.019293 systemd[1]: Stopped verity-setup.service. Jul 2 00:44:37.019323 systemd[1]: Mounted dev-hugepages.mount. Jul 2 00:44:37.019353 systemd[1]: Mounted dev-mqueue.mount. Jul 2 00:44:37.019388 systemd[1]: Mounted media.mount. Jul 2 00:44:37.019419 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 00:44:37.019465 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 00:44:37.019498 systemd[1]: Mounted tmp.mount. Jul 2 00:44:37.019529 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:44:37.019559 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 00:44:37.019590 systemd-journald[1410]: Journal started Jul 2 00:44:37.019693 systemd-journald[1410]: Runtime Journal (/run/log/journal/ec22f426266dbdf34c7cfb056cfd73a3) is 8.0M, max 75.4M, 67.4M free. Jul 2 00:44:31.855000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 00:44:32.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:44:32.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:44:32.132000 audit: BPF prog-id=10 op=LOAD Jul 2 00:44:32.132000 audit: BPF prog-id=10 op=UNLOAD Jul 2 00:44:32.132000 audit: BPF prog-id=11 op=LOAD Jul 2 00:44:32.132000 audit: BPF prog-id=11 op=UNLOAD Jul 2 00:44:32.434000 audit[1331]: AVC avc: denied { associate } for pid=1331 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 00:44:32.434000 audit[1331]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458c4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1314 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:32.434000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 00:44:32.438000 audit[1331]: AVC avc: denied { associate } for pid=1331 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 00:44:32.438000 audit[1331]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001459a9 a2=1ed a3=0 items=2 ppid=1314 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:32.438000 audit: CWD cwd="/" Jul 2 00:44:32.438000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:44:32.438000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:44:32.438000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 00:44:36.622000 audit: BPF prog-id=12 op=LOAD Jul 2 00:44:36.622000 audit: BPF prog-id=3 op=UNLOAD Jul 2 00:44:36.623000 audit: BPF prog-id=13 op=LOAD Jul 2 00:44:36.625000 audit: BPF prog-id=14 op=LOAD Jul 2 00:44:36.625000 audit: BPF prog-id=4 op=UNLOAD Jul 2 00:44:36.626000 audit: BPF prog-id=5 op=UNLOAD Jul 2 00:44:36.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.646000 audit: BPF prog-id=12 op=UNLOAD Jul 2 00:44:36.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:36.917000 audit: BPF prog-id=15 op=LOAD Jul 2 00:44:36.918000 audit: BPF prog-id=16 op=LOAD Jul 2 00:44:36.918000 audit: BPF prog-id=17 op=LOAD Jul 2 00:44:36.918000 audit: BPF prog-id=13 op=UNLOAD Jul 2 00:44:36.918000 audit: BPF prog-id=14 op=UNLOAD Jul 2 00:44:36.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.026897 systemd[1]: Finished modprobe@configfs.service. Jul 2 00:44:36.998000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 00:44:36.998000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffdd7c9f60 a2=4000 a3=1 items=0 ppid=1 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:36.998000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 00:44:37.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:32.410291 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:44:36.619626 systemd[1]: Queued start job for default target multi-user.target. Jul 2 00:44:32.420874 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 00:44:36.631233 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 00:44:32.420930 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 00:44:32.421001 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 00:44:32.421029 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 00:44:32.421098 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 00:44:32.421130 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 00:44:32.421600 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 00:44:32.421689 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 00:44:37.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:32.421726 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 00:44:32.423552 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 00:44:32.423640 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 00:44:32.423688 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 00:44:32.423728 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 00:44:32.423777 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 00:44:32.423816 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 00:44:35.712420 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:44:35.712959 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:44:37.033582 systemd[1]: Started systemd-journald.service. Jul 2 00:44:37.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:35.713222 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:44:35.713676 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:44:35.713780 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 00:44:35.713915 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2024-07-02T00:44:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 00:44:37.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.035297 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:44:37.035631 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:44:37.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.038378 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:44:37.038709 systemd[1]: Finished modprobe@drm.service. Jul 2 00:44:37.041392 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:44:37.041732 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:44:37.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.044605 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 00:44:37.044932 systemd[1]: Finished modprobe@fuse.service. Jul 2 00:44:37.047642 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:44:37.047908 systemd[1]: Finished modprobe@loop.service. Jul 2 00:44:37.050515 systemd[1]: Finished systemd-network-generator.service. Jul 2 00:44:37.053382 systemd[1]: Finished systemd-remount-fs.service. Jul 2 00:44:37.057234 systemd[1]: Reached target network-pre.target. Jul 2 00:44:37.061978 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 00:44:37.066822 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 00:44:37.074196 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 00:44:37.079186 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 00:44:37.084262 systemd[1]: Starting systemd-journal-flush.service... Jul 2 00:44:37.086924 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:44:37.089214 systemd[1]: Starting systemd-random-seed.service... Jul 2 00:44:37.092107 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:44:37.095228 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:44:37.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.099141 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 00:44:37.101614 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 00:44:37.106013 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:44:37.135212 systemd-journald[1410]: Time spent on flushing to /var/log/journal/ec22f426266dbdf34c7cfb056cfd73a3 is 70.179ms for 1127 entries. Jul 2 00:44:37.135212 systemd-journald[1410]: System Journal (/var/log/journal/ec22f426266dbdf34c7cfb056cfd73a3) is 8.0M, max 195.6M, 187.6M free. Jul 2 00:44:37.253007 systemd-journald[1410]: Received client request to flush runtime journal. Jul 2 00:44:37.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.160052 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:44:37.162854 systemd[1]: Finished systemd-random-seed.service. Jul 2 00:44:37.165251 systemd[1]: Reached target first-boot-complete.target. Jul 2 00:44:37.217879 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 00:44:37.223567 systemd[1]: Starting systemd-sysusers.service... Jul 2 00:44:37.254806 systemd[1]: Finished systemd-journal-flush.service. Jul 2 00:44:37.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.302850 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:44:37.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:37.307311 systemd[1]: Starting systemd-udev-settle.service... Jul 2 00:44:37.323128 udevadm[1450]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 00:44:37.389039 systemd[1]: Finished systemd-sysusers.service. Jul 2 00:44:37.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.034364 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 00:44:38.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.036000 audit: BPF prog-id=18 op=LOAD Jul 2 00:44:38.036000 audit: BPF prog-id=19 op=LOAD Jul 2 00:44:38.036000 audit: BPF prog-id=7 op=UNLOAD Jul 2 00:44:38.036000 audit: BPF prog-id=8 op=UNLOAD Jul 2 00:44:38.039231 systemd[1]: Starting systemd-udevd.service... Jul 2 00:44:38.076617 systemd-udevd[1451]: Using default interface naming scheme 'v252'. Jul 2 00:44:38.129333 systemd[1]: Started systemd-udevd.service. Jul 2 00:44:38.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.131000 audit: BPF prog-id=20 op=LOAD Jul 2 00:44:38.136788 systemd[1]: Starting systemd-networkd.service... Jul 2 00:44:38.153000 audit: BPF prog-id=21 op=LOAD Jul 2 00:44:38.154000 audit: BPF prog-id=22 op=LOAD Jul 2 00:44:38.154000 audit: BPF prog-id=23 op=LOAD Jul 2 00:44:38.156930 systemd[1]: Starting systemd-userdbd.service... Jul 2 00:44:38.197170 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 00:44:38.246847 systemd[1]: Started systemd-userdbd.service. Jul 2 00:44:38.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.257811 (udev-worker)[1460]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:44:38.389334 systemd-networkd[1461]: lo: Link UP Jul 2 00:44:38.389356 systemd-networkd[1461]: lo: Gained carrier Jul 2 00:44:38.390281 systemd-networkd[1461]: Enumeration completed Jul 2 00:44:38.390475 systemd[1]: Started systemd-networkd.service. Jul 2 00:44:38.390515 systemd-networkd[1461]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:44:38.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.401487 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:44:38.401921 systemd-networkd[1461]: eth0: Link UP Jul 2 00:44:38.402214 systemd-networkd[1461]: eth0: Gained carrier Jul 2 00:44:38.413346 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 00:44:38.419687 systemd-networkd[1461]: eth0: DHCPv4 address 172.31.27.140/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 2 00:44:38.501473 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1458) Jul 2 00:44:38.612066 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:44:38.615346 systemd[1]: Finished systemd-udev-settle.service. Jul 2 00:44:38.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.620322 systemd[1]: Starting lvm2-activation-early.service... Jul 2 00:44:38.697078 lvm[1570]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:44:38.733225 systemd[1]: Finished lvm2-activation-early.service. Jul 2 00:44:38.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.735765 systemd[1]: Reached target cryptsetup.target. Jul 2 00:44:38.740439 systemd[1]: Starting lvm2-activation.service... Jul 2 00:44:38.749945 lvm[1571]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:44:38.787291 systemd[1]: Finished lvm2-activation.service. Jul 2 00:44:38.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.789573 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:44:38.791604 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 00:44:38.791654 systemd[1]: Reached target local-fs.target. Jul 2 00:44:38.793614 systemd[1]: Reached target machines.target. Jul 2 00:44:38.797576 systemd[1]: Starting ldconfig.service... Jul 2 00:44:38.800182 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:44:38.800437 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:44:38.803222 systemd[1]: Starting systemd-boot-update.service... Jul 2 00:44:38.807662 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 00:44:38.812949 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 00:44:38.817601 systemd[1]: Starting systemd-sysext.service... Jul 2 00:44:38.829139 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1573 (bootctl) Jul 2 00:44:38.831437 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 00:44:38.864420 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 00:44:38.874894 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 00:44:38.875266 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 00:44:38.883239 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 00:44:38.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.907498 kernel: loop0: detected capacity change from 0 to 194512 Jul 2 00:44:38.947215 systemd-fsck[1583]: fsck.fat 4.2 (2021-01-31) Jul 2 00:44:38.947215 systemd-fsck[1583]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Jul 2 00:44:38.950694 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 00:44:38.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:38.957767 systemd[1]: Mounting boot.mount... Jul 2 00:44:38.983809 systemd[1]: Mounted boot.mount. Jul 2 00:44:39.007852 systemd[1]: Finished systemd-boot-update.service. Jul 2 00:44:39.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.200487 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 00:44:39.230487 kernel: loop1: detected capacity change from 0 to 194512 Jul 2 00:44:39.245067 (sd-sysext)[1599]: Using extensions 'kubernetes'. Jul 2 00:44:39.247540 (sd-sysext)[1599]: Merged extensions into '/usr'. Jul 2 00:44:39.284412 systemd[1]: Mounting usr-share-oem.mount... Jul 2 00:44:39.287781 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:44:39.290541 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:44:39.296707 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:44:39.302355 systemd[1]: Starting modprobe@loop.service... Jul 2 00:44:39.305386 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:44:39.305701 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:44:39.311626 systemd[1]: Mounted usr-share-oem.mount. Jul 2 00:44:39.314655 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:44:39.314959 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:44:39.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.318156 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:44:39.318488 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:44:39.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.322395 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:44:39.322739 systemd[1]: Finished modprobe@loop.service. Jul 2 00:44:39.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.326586 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:44:39.326766 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:44:39.328710 systemd[1]: Finished systemd-sysext.service. Jul 2 00:44:39.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.334013 systemd[1]: Starting ensure-sysext.service... Jul 2 00:44:39.338978 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 00:44:39.356015 systemd[1]: Reloading. Jul 2 00:44:39.442545 systemd-tmpfiles[1606]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 00:44:39.446342 /usr/lib/systemd/system-generators/torcx-generator[1625]: time="2024-07-02T00:44:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:44:39.446989 /usr/lib/systemd/system-generators/torcx-generator[1625]: time="2024-07-02T00:44:39Z" level=info msg="torcx already run" Jul 2 00:44:39.457591 systemd-tmpfiles[1606]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 00:44:39.474764 systemd-tmpfiles[1606]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 00:44:39.721503 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:44:39.721561 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:44:39.770166 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:44:39.794683 systemd-networkd[1461]: eth0: Gained IPv6LL Jul 2 00:44:39.941000 audit: BPF prog-id=24 op=LOAD Jul 2 00:44:39.941000 audit: BPF prog-id=15 op=UNLOAD Jul 2 00:44:39.941000 audit: BPF prog-id=25 op=LOAD Jul 2 00:44:39.941000 audit: BPF prog-id=26 op=LOAD Jul 2 00:44:39.942000 audit: BPF prog-id=16 op=UNLOAD Jul 2 00:44:39.942000 audit: BPF prog-id=17 op=UNLOAD Jul 2 00:44:39.947000 audit: BPF prog-id=27 op=LOAD Jul 2 00:44:39.947000 audit: BPF prog-id=28 op=LOAD Jul 2 00:44:39.947000 audit: BPF prog-id=18 op=UNLOAD Jul 2 00:44:39.947000 audit: BPF prog-id=19 op=UNLOAD Jul 2 00:44:39.948000 audit: BPF prog-id=29 op=LOAD Jul 2 00:44:39.948000 audit: BPF prog-id=21 op=UNLOAD Jul 2 00:44:39.948000 audit: BPF prog-id=30 op=LOAD Jul 2 00:44:39.948000 audit: BPF prog-id=31 op=LOAD Jul 2 00:44:39.948000 audit: BPF prog-id=22 op=UNLOAD Jul 2 00:44:39.948000 audit: BPF prog-id=23 op=UNLOAD Jul 2 00:44:39.956000 audit: BPF prog-id=32 op=LOAD Jul 2 00:44:39.956000 audit: BPF prog-id=20 op=UNLOAD Jul 2 00:44:39.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.962987 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 00:44:39.968781 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 00:44:39.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:39.989833 systemd[1]: Starting audit-rules.service... Jul 2 00:44:39.996253 systemd[1]: Starting clean-ca-certificates.service... Jul 2 00:44:40.003211 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 00:44:40.007000 audit: BPF prog-id=33 op=LOAD Jul 2 00:44:40.015332 systemd[1]: Starting systemd-resolved.service... Jul 2 00:44:40.018000 audit: BPF prog-id=34 op=LOAD Jul 2 00:44:40.035887 systemd[1]: Starting systemd-timesyncd.service... Jul 2 00:44:40.041624 systemd[1]: Starting systemd-update-utmp.service... Jul 2 00:44:40.048734 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 00:44:40.051312 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 00:44:40.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.056193 systemd[1]: Finished clean-ca-certificates.service. Jul 2 00:44:40.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.063914 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.068195 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:44:40.073747 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:44:40.079386 systemd[1]: Starting modprobe@loop.service... Jul 2 00:44:40.084000 audit[1694]: SYSTEM_BOOT pid=1694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.082549 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.082908 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:44:40.083158 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:44:40.085564 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:44:40.085886 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:44:40.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.096629 systemd[1]: Finished systemd-update-utmp.service. Jul 2 00:44:40.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.102180 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.105312 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:44:40.108525 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.108836 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:44:40.109133 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:44:40.110776 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:44:40.111101 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:44:40.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.115691 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:44:40.115992 systemd[1]: Finished modprobe@loop.service. Jul 2 00:44:40.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.120084 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:44:40.125414 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:44:40.125743 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:44:40.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.130375 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.134224 systemd[1]: Starting modprobe@drm.service... Jul 2 00:44:40.140933 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:44:40.146672 systemd[1]: Starting modprobe@loop.service... Jul 2 00:44:40.149792 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.150114 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:44:40.150386 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:44:40.152524 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:44:40.152852 systemd[1]: Finished modprobe@drm.service. Jul 2 00:44:40.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.158912 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 00:44:40.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.163681 systemd[1]: Finished ensure-sysext.service. Jul 2 00:44:40.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.167058 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:44:40.167341 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:44:40.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.170091 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:44:40.178375 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:44:40.178739 systemd[1]: Finished modprobe@loop.service. Jul 2 00:44:40.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:40.181949 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.257242 systemd-resolved[1687]: Positive Trust Anchors: Jul 2 00:44:40.257270 systemd-resolved[1687]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:44:40.257322 systemd-resolved[1687]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:44:40.256000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 00:44:40.256000 audit[1711]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe46203e0 a2=420 a3=0 items=0 ppid=1683 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:40.256000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 00:44:40.258589 augenrules[1711]: No rules Jul 2 00:44:40.260012 systemd[1]: Finished audit-rules.service. Jul 2 00:44:40.301281 systemd[1]: Started systemd-timesyncd.service. Jul 2 00:44:40.303501 systemd[1]: Reached target time-set.target. Jul 2 00:44:40.311760 systemd-resolved[1687]: Defaulting to hostname 'linux'. Jul 2 00:44:40.314647 systemd[1]: Started systemd-resolved.service. Jul 2 00:44:40.316843 systemd[1]: Reached target network.target. Jul 2 00:44:40.318783 systemd[1]: Reached target network-online.target. Jul 2 00:44:40.320799 systemd[1]: Reached target nss-lookup.target. Jul 2 00:44:40.339486 ldconfig[1572]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 00:44:40.346428 systemd[1]: Finished ldconfig.service. Jul 2 00:44:40.350753 systemd[1]: Starting systemd-update-done.service... Jul 2 00:44:40.365438 systemd[1]: Finished systemd-update-done.service. Jul 2 00:44:40.367875 systemd[1]: Reached target sysinit.target. Jul 2 00:44:40.370169 systemd[1]: Started motdgen.path. Jul 2 00:44:40.372022 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 00:44:40.374768 systemd[1]: Started logrotate.timer. Jul 2 00:44:40.376642 systemd[1]: Started mdadm.timer. Jul 2 00:44:40.378479 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 00:44:40.380499 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 00:44:40.380559 systemd[1]: Reached target paths.target. Jul 2 00:44:40.382223 systemd[1]: Reached target timers.target. Jul 2 00:44:40.384422 systemd[1]: Listening on dbus.socket. Jul 2 00:44:40.388146 systemd[1]: Starting docker.socket... Jul 2 00:44:40.394910 systemd[1]: Listening on sshd.socket. Jul 2 00:44:40.397145 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:44:40.398226 systemd[1]: Listening on docker.socket. Jul 2 00:44:40.400432 systemd[1]: Reached target sockets.target. Jul 2 00:44:40.402531 systemd[1]: Reached target basic.target. Jul 2 00:44:40.402693 systemd-timesyncd[1693]: Contacted time server 135.148.100.14:123 (0.flatcar.pool.ntp.org). Jul 2 00:44:40.402801 systemd-timesyncd[1693]: Initial clock synchronization to Tue 2024-07-02 00:44:40.753355 UTC. Jul 2 00:44:40.405281 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.405489 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:44:40.416611 systemd[1]: Started amazon-ssm-agent.service. Jul 2 00:44:40.421616 systemd[1]: Starting containerd.service... Jul 2 00:44:40.425888 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 00:44:40.430434 systemd[1]: Starting dbus.service... Jul 2 00:44:40.434379 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 00:44:40.440318 systemd[1]: Starting extend-filesystems.service... Jul 2 00:44:40.442311 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 00:44:40.446498 systemd[1]: Starting kubelet.service... Jul 2 00:44:40.451630 systemd[1]: Starting motdgen.service... Jul 2 00:44:40.456093 systemd[1]: Started nvidia.service. Jul 2 00:44:40.462105 jq[1724]: false Jul 2 00:44:40.462398 systemd[1]: Starting prepare-helm.service... Jul 2 00:44:40.468118 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 00:44:40.473013 systemd[1]: Starting sshd-keygen.service... Jul 2 00:44:40.497835 systemd[1]: Starting systemd-logind.service... Jul 2 00:44:40.500454 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:44:40.500606 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 00:44:40.511226 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 00:44:40.512917 systemd[1]: Starting update-engine.service... Jul 2 00:44:40.517909 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 00:44:40.529647 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 00:44:40.530067 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 00:44:40.534184 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 00:44:40.534601 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 00:44:40.602048 jq[1737]: true Jul 2 00:44:40.673025 tar[1746]: linux-arm64/helm Jul 2 00:44:40.692635 jq[1748]: true Jul 2 00:44:40.694829 extend-filesystems[1725]: Found loop1 Jul 2 00:44:40.698223 extend-filesystems[1725]: Found nvme0n1 Jul 2 00:44:40.707403 systemd[1]: Started dbus.service. Jul 2 00:44:40.707078 dbus-daemon[1723]: [system] SELinux support is enabled Jul 2 00:44:40.716265 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 00:44:40.716336 systemd[1]: Reached target system-config.target. Jul 2 00:44:40.719986 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 00:44:40.720026 systemd[1]: Reached target user-config.target. Jul 2 00:44:40.727878 dbus-daemon[1723]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1461 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 00:44:40.729376 extend-filesystems[1725]: Found nvme0n1p1 Jul 2 00:44:40.729376 extend-filesystems[1725]: Found nvme0n1p2 Jul 2 00:44:40.729376 extend-filesystems[1725]: Found nvme0n1p3 Jul 2 00:44:40.729376 extend-filesystems[1725]: Found usr Jul 2 00:44:40.729376 extend-filesystems[1725]: Found nvme0n1p4 Jul 2 00:44:40.729376 extend-filesystems[1725]: Found nvme0n1p6 Jul 2 00:44:40.729376 extend-filesystems[1725]: Found nvme0n1p7 Jul 2 00:44:40.729376 extend-filesystems[1725]: Found nvme0n1p9 Jul 2 00:44:40.729376 extend-filesystems[1725]: Checking size of /dev/nvme0n1p9 Jul 2 00:44:40.785523 systemd[1]: Starting systemd-hostnamed.service... Jul 2 00:44:40.757472 dbus-daemon[1723]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 00:44:40.847767 extend-filesystems[1725]: Resized partition /dev/nvme0n1p9 Jul 2 00:44:40.850791 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 00:44:40.851128 systemd[1]: Finished motdgen.service. Jul 2 00:44:40.865978 extend-filesystems[1787]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 00:44:40.897471 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Jul 2 00:44:40.899553 amazon-ssm-agent[1720]: 2024/07/02 00:44:40 Failed to load instance info from vault. RegistrationKey does not exist. Jul 2 00:44:40.904967 amazon-ssm-agent[1720]: Initializing new seelog logger Jul 2 00:44:40.904967 amazon-ssm-agent[1720]: New Seelog Logger Creation Complete Jul 2 00:44:40.904967 amazon-ssm-agent[1720]: 2024/07/02 00:44:40 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jul 2 00:44:40.904967 amazon-ssm-agent[1720]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jul 2 00:44:40.906058 amazon-ssm-agent[1720]: 2024/07/02 00:44:40 processing appconfig overrides Jul 2 00:44:40.947957 update_engine[1736]: I0702 00:44:40.947588 1736 main.cc:92] Flatcar Update Engine starting Jul 2 00:44:40.968609 update_engine[1736]: I0702 00:44:40.952410 1736 update_check_scheduler.cc:74] Next update check in 4m0s Jul 2 00:44:40.952080 systemd[1]: Started update-engine.service. Jul 2 00:44:40.958396 systemd[1]: Started locksmithd.service. Jul 2 00:44:40.979472 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Jul 2 00:44:41.013545 bash[1788]: Updated "/home/core/.ssh/authorized_keys" Jul 2 00:44:40.981367 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 00:44:41.021730 extend-filesystems[1787]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Jul 2 00:44:41.021730 extend-filesystems[1787]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 2 00:44:41.021730 extend-filesystems[1787]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Jul 2 00:44:41.042237 extend-filesystems[1725]: Resized filesystem in /dev/nvme0n1p9 Jul 2 00:44:41.028256 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 00:44:41.028632 systemd[1]: Finished extend-filesystems.service. Jul 2 00:44:41.053174 env[1742]: time="2024-07-02T00:44:41.053082041Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 00:44:41.071247 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 00:44:41.143656 systemd-logind[1733]: Watching system buttons on /dev/input/event0 (Power Button) Jul 2 00:44:41.143711 systemd-logind[1733]: Watching system buttons on /dev/input/event1 (Sleep Button) Jul 2 00:44:41.148938 systemd-logind[1733]: New seat seat0. Jul 2 00:44:41.156288 systemd[1]: Started systemd-logind.service. Jul 2 00:44:41.216035 env[1742]: time="2024-07-02T00:44:41.215879526Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 00:44:41.216289 env[1742]: time="2024-07-02T00:44:41.216237476Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:44:41.227830 env[1742]: time="2024-07-02T00:44:41.227746788Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:44:41.227830 env[1742]: time="2024-07-02T00:44:41.227820894Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:44:41.268490 env[1742]: time="2024-07-02T00:44:41.268401726Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:44:41.268490 env[1742]: time="2024-07-02T00:44:41.268470432Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 00:44:41.268735 env[1742]: time="2024-07-02T00:44:41.268527928Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 00:44:41.268735 env[1742]: time="2024-07-02T00:44:41.268555135Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 00:44:41.268848 env[1742]: time="2024-07-02T00:44:41.268770711Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:44:41.272687 env[1742]: time="2024-07-02T00:44:41.272615015Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:44:41.273022 env[1742]: time="2024-07-02T00:44:41.272966076Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:44:41.273022 env[1742]: time="2024-07-02T00:44:41.273017108Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 00:44:41.273219 env[1742]: time="2024-07-02T00:44:41.273169540Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 00:44:41.273309 env[1742]: time="2024-07-02T00:44:41.273213419Z" level=info msg="metadata content store policy set" policy=shared Jul 2 00:44:41.280862 env[1742]: time="2024-07-02T00:44:41.280785433Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 00:44:41.281045 env[1742]: time="2024-07-02T00:44:41.280895814Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 00:44:41.281045 env[1742]: time="2024-07-02T00:44:41.280934307Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 00:44:41.281045 env[1742]: time="2024-07-02T00:44:41.281030359Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.281236 env[1742]: time="2024-07-02T00:44:41.281148631Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.281236 env[1742]: time="2024-07-02T00:44:41.281189354Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.281236 env[1742]: time="2024-07-02T00:44:41.281222311Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.281867 env[1742]: time="2024-07-02T00:44:41.281806322Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.282052 env[1742]: time="2024-07-02T00:44:41.281871584Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.282052 env[1742]: time="2024-07-02T00:44:41.281908173Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.282052 env[1742]: time="2024-07-02T00:44:41.281987351Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.282052 env[1742]: time="2024-07-02T00:44:41.282030316Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 00:44:41.282301 env[1742]: time="2024-07-02T00:44:41.282256928Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 00:44:41.282516 env[1742]: time="2024-07-02T00:44:41.282446663Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 00:44:41.283131 env[1742]: time="2024-07-02T00:44:41.283080141Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 00:44:41.283211 env[1742]: time="2024-07-02T00:44:41.283145553Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283211 env[1742]: time="2024-07-02T00:44:41.283184409Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 00:44:41.283324 env[1742]: time="2024-07-02T00:44:41.283300127Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283499 env[1742]: time="2024-07-02T00:44:41.283333634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283584 env[1742]: time="2024-07-02T00:44:41.283492592Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283584 env[1742]: time="2024-07-02T00:44:41.283528868Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283584 env[1742]: time="2024-07-02T00:44:41.283560297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283749 env[1742]: time="2024-07-02T00:44:41.283595683Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283749 env[1742]: time="2024-07-02T00:44:41.283627926Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283749 env[1742]: time="2024-07-02T00:44:41.283658314Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.283749 env[1742]: time="2024-07-02T00:44:41.283693000Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 00:44:41.284016 env[1742]: time="2024-07-02T00:44:41.283973086Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.284086 env[1742]: time="2024-07-02T00:44:41.284029079Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.284086 env[1742]: time="2024-07-02T00:44:41.284063589Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.284233 env[1742]: time="2024-07-02T00:44:41.284093451Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 00:44:41.284233 env[1742]: time="2024-07-02T00:44:41.284127222Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 00:44:41.284233 env[1742]: time="2024-07-02T00:44:41.284172341Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 00:44:41.284233 env[1742]: time="2024-07-02T00:44:41.284212488Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 00:44:41.284454 env[1742]: time="2024-07-02T00:44:41.284277562Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 00:44:41.284756 env[1742]: time="2024-07-02T00:44:41.284631341Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 00:44:41.284756 env[1742]: time="2024-07-02T00:44:41.284746970Z" level=info msg="Connect containerd service" Jul 2 00:44:41.285866 env[1742]: time="2024-07-02T00:44:41.284808336Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 00:44:41.286122 env[1742]: time="2024-07-02T00:44:41.286050050Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:44:41.286597 env[1742]: time="2024-07-02T00:44:41.286548620Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 00:44:41.286682 env[1742]: time="2024-07-02T00:44:41.286658788Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 00:44:41.286866 systemd[1]: Started containerd.service. Jul 2 00:44:41.294206 env[1742]: time="2024-07-02T00:44:41.294135853Z" level=info msg="containerd successfully booted in 0.258490s" Jul 2 00:44:41.299974 env[1742]: time="2024-07-02T00:44:41.297876753Z" level=info msg="Start subscribing containerd event" Jul 2 00:44:41.299974 env[1742]: time="2024-07-02T00:44:41.298397181Z" level=info msg="Start recovering state" Jul 2 00:44:41.328410 env[1742]: time="2024-07-02T00:44:41.328325683Z" level=info msg="Start event monitor" Jul 2 00:44:41.328595 env[1742]: time="2024-07-02T00:44:41.328417876Z" level=info msg="Start snapshots syncer" Jul 2 00:44:41.328595 env[1742]: time="2024-07-02T00:44:41.328449680Z" level=info msg="Start cni network conf syncer for default" Jul 2 00:44:41.328595 env[1742]: time="2024-07-02T00:44:41.328472002Z" level=info msg="Start streaming server" Jul 2 00:44:41.353407 dbus-daemon[1723]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 00:44:41.353700 systemd[1]: Started systemd-hostnamed.service. Jul 2 00:44:41.358699 dbus-daemon[1723]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1772 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 00:44:41.364134 systemd[1]: Starting polkit.service... Jul 2 00:44:41.407292 polkitd[1824]: Started polkitd version 121 Jul 2 00:44:41.438132 polkitd[1824]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 00:44:41.438261 polkitd[1824]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 00:44:41.445112 polkitd[1824]: Finished loading, compiling and executing 2 rules Jul 2 00:44:41.448804 dbus-daemon[1723]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 00:44:41.449096 systemd[1]: Started polkit.service. Jul 2 00:44:41.452582 polkitd[1824]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 00:44:41.486827 systemd-hostnamed[1772]: Hostname set to (transient) Jul 2 00:44:41.486987 systemd-resolved[1687]: System hostname changed to 'ip-172-31-27-140'. Jul 2 00:44:41.700770 coreos-metadata[1722]: Jul 02 00:44:41.700 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jul 2 00:44:41.706474 coreos-metadata[1722]: Jul 02 00:44:41.706 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Jul 2 00:44:41.711881 coreos-metadata[1722]: Jul 02 00:44:41.711 INFO Fetch successful Jul 2 00:44:41.711881 coreos-metadata[1722]: Jul 02 00:44:41.711 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 2 00:44:41.713971 coreos-metadata[1722]: Jul 02 00:44:41.713 INFO Fetch successful Jul 2 00:44:41.727808 unknown[1722]: wrote ssh authorized keys file for user: core Jul 2 00:44:41.752499 update-ssh-keys[1881]: Updated "/home/core/.ssh/authorized_keys" Jul 2 00:44:41.753910 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 00:44:41.864918 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Create new startup processor Jul 2 00:44:41.865233 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [LongRunningPluginsManager] registered plugins: {} Jul 2 00:44:41.865308 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Initializing bookkeeping folders Jul 2 00:44:41.865308 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO removing the completed state files Jul 2 00:44:41.865446 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Initializing bookkeeping folders for long running plugins Jul 2 00:44:41.865446 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Jul 2 00:44:41.865446 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Initializing healthcheck folders for long running plugins Jul 2 00:44:41.865446 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Initializing locations for inventory plugin Jul 2 00:44:41.865702 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Initializing default location for custom inventory Jul 2 00:44:41.873145 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Initializing default location for file inventory Jul 2 00:44:41.874358 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Initializing default location for role inventory Jul 2 00:44:41.874580 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Init the cloudwatchlogs publisher Jul 2 00:44:41.874734 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:runPowerShellScript Jul 2 00:44:41.874913 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:updateSsmAgent Jul 2 00:44:41.875048 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:downloadContent Jul 2 00:44:41.875171 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:runDocument Jul 2 00:44:41.875300 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:configurePackage Jul 2 00:44:41.875429 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:softwareInventory Jul 2 00:44:41.881848 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:configureDocker Jul 2 00:44:41.882059 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:runDockerAction Jul 2 00:44:41.882185 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform independent plugin aws:refreshAssociation Jul 2 00:44:41.882317 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Successfully loaded platform dependent plugin aws:runShellScript Jul 2 00:44:41.882439 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Jul 2 00:44:41.882638 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO OS: linux, Arch: arm64 Jul 2 00:44:41.889980 amazon-ssm-agent[1720]: datastore file /var/lib/amazon/ssm/i-07b4bdeea26f5afd3/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Jul 2 00:44:41.895026 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] Starting document processing engine... Jul 2 00:44:41.995905 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] [EngineProcessor] Starting Jul 2 00:44:42.090766 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Jul 2 00:44:42.185371 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] Starting message polling Jul 2 00:44:42.280163 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] Starting send replies to MDS Jul 2 00:44:42.375032 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [instanceID=i-07b4bdeea26f5afd3] Starting association polling Jul 2 00:44:42.470164 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [LongRunningPluginsManager] starting long running plugin manager Jul 2 00:44:42.540813 tar[1746]: linux-arm64/LICENSE Jul 2 00:44:42.541344 tar[1746]: linux-arm64/README.md Jul 2 00:44:42.549433 systemd[1]: Finished prepare-helm.service. Jul 2 00:44:42.565556 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [HealthCheck] HealthCheck reporting agent health. Jul 2 00:44:42.661157 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Jul 2 00:44:42.756838 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessageGatewayService] Starting session document processing engine... Jul 2 00:44:42.852774 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessageGatewayService] [EngineProcessor] Starting Jul 2 00:44:42.876091 systemd[1]: Started kubelet.service. Jul 2 00:44:42.895965 locksmithd[1801]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 00:44:42.948760 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Jul 2 00:44:43.045121 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-07b4bdeea26f5afd3, requestId: 859b16f5-845a-47d0-a085-77f9e98b5478 Jul 2 00:44:43.141687 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [OfflineService] Starting document processing engine... Jul 2 00:44:43.238329 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [OfflineService] [EngineProcessor] Starting Jul 2 00:44:43.335244 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [OfflineService] [EngineProcessor] Initial processing Jul 2 00:44:43.432454 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [OfflineService] Starting message polling Jul 2 00:44:43.529633 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [OfflineService] Starting send replies to MDS Jul 2 00:44:43.627155 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Jul 2 00:44:43.724902 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] [Association] Launching response handler Jul 2 00:44:43.746329 kubelet[1924]: E0702 00:44:43.746229 1924 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:44:43.750667 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:44:43.750981 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:44:43.751418 systemd[1]: kubelet.service: Consumed 1.474s CPU time. Jul 2 00:44:43.822702 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Jul 2 00:44:43.920777 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Jul 2 00:44:44.019071 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Jul 2 00:44:44.117460 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessageGatewayService] listening reply. Jul 2 00:44:44.216102 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Jul 2 00:44:44.314970 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [StartupProcessor] Executing startup processor tasks Jul 2 00:44:44.413933 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Jul 2 00:44:44.513147 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Jul 2 00:44:44.612642 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.5 Jul 2 00:44:44.695060 sshd_keygen[1761]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 00:44:44.712315 amazon-ssm-agent[1720]: 2024-07-02 00:44:41 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-07b4bdeea26f5afd3?role=subscribe&stream=input Jul 2 00:44:44.732465 systemd[1]: Finished sshd-keygen.service. Jul 2 00:44:44.737689 systemd[1]: Starting issuegen.service... Jul 2 00:44:44.749532 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 00:44:44.749892 systemd[1]: Finished issuegen.service. Jul 2 00:44:44.754875 systemd[1]: Starting systemd-user-sessions.service... Jul 2 00:44:44.770304 systemd[1]: Finished systemd-user-sessions.service. Jul 2 00:44:44.776050 systemd[1]: Started getty@tty1.service. Jul 2 00:44:44.781158 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 00:44:44.784383 systemd[1]: Reached target getty.target. Jul 2 00:44:44.786885 systemd[1]: Reached target multi-user.target. Jul 2 00:44:44.793230 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 00:44:44.810310 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 00:44:44.810721 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 00:44:44.813633 amazon-ssm-agent[1720]: 2024-07-02 00:44:42 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-07b4bdeea26f5afd3?role=subscribe&stream=input Jul 2 00:44:44.813952 systemd[1]: Startup finished in 1.129s (kernel) + 9.111s (initrd) + 13.113s (userspace) = 23.354s. Jul 2 00:44:44.913844 amazon-ssm-agent[1720]: 2024-07-02 00:44:42 INFO [MessageGatewayService] Starting receiving message from control channel Jul 2 00:44:45.014943 amazon-ssm-agent[1720]: 2024-07-02 00:44:42 INFO [MessageGatewayService] [EngineProcessor] Initial processing Jul 2 00:44:49.472083 systemd[1]: Created slice system-sshd.slice. Jul 2 00:44:49.475319 systemd[1]: Started sshd@0-172.31.27.140:22-139.178.89.65:33706.service. Jul 2 00:44:49.828708 sshd[1945]: Accepted publickey for core from 139.178.89.65 port 33706 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:44:49.834039 sshd[1945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:44:49.853785 systemd[1]: Created slice user-500.slice. Jul 2 00:44:49.856133 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 00:44:49.862504 systemd-logind[1733]: New session 1 of user core. Jul 2 00:44:49.875647 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 00:44:49.878792 systemd[1]: Starting user@500.service... Jul 2 00:44:49.886605 (systemd)[1948]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:44:50.074450 systemd[1948]: Queued start job for default target default.target. Jul 2 00:44:50.075555 systemd[1948]: Reached target paths.target. Jul 2 00:44:50.075608 systemd[1948]: Reached target sockets.target. Jul 2 00:44:50.075640 systemd[1948]: Reached target timers.target. Jul 2 00:44:50.075670 systemd[1948]: Reached target basic.target. Jul 2 00:44:50.075763 systemd[1948]: Reached target default.target. Jul 2 00:44:50.075828 systemd[1948]: Startup finished in 176ms. Jul 2 00:44:50.076741 systemd[1]: Started user@500.service. Jul 2 00:44:50.078763 systemd[1]: Started session-1.scope. Jul 2 00:44:50.227986 systemd[1]: Started sshd@1-172.31.27.140:22-139.178.89.65:33722.service. Jul 2 00:44:50.407338 sshd[1957]: Accepted publickey for core from 139.178.89.65 port 33722 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:44:50.410411 sshd[1957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:44:50.419258 systemd[1]: Started session-2.scope. Jul 2 00:44:50.420209 systemd-logind[1733]: New session 2 of user core. Jul 2 00:44:50.551221 sshd[1957]: pam_unix(sshd:session): session closed for user core Jul 2 00:44:50.556000 systemd[1]: sshd@1-172.31.27.140:22-139.178.89.65:33722.service: Deactivated successfully. Jul 2 00:44:50.557311 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 00:44:50.558376 systemd-logind[1733]: Session 2 logged out. Waiting for processes to exit. Jul 2 00:44:50.559816 systemd-logind[1733]: Removed session 2. Jul 2 00:44:50.581246 systemd[1]: Started sshd@2-172.31.27.140:22-139.178.89.65:33730.service. Jul 2 00:44:50.757426 sshd[1963]: Accepted publickey for core from 139.178.89.65 port 33730 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:44:50.759358 sshd[1963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:44:50.767433 systemd-logind[1733]: New session 3 of user core. Jul 2 00:44:50.768347 systemd[1]: Started session-3.scope. Jul 2 00:44:50.894442 sshd[1963]: pam_unix(sshd:session): session closed for user core Jul 2 00:44:50.899688 systemd-logind[1733]: Session 3 logged out. Waiting for processes to exit. Jul 2 00:44:50.899848 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 00:44:50.900974 systemd[1]: sshd@2-172.31.27.140:22-139.178.89.65:33730.service: Deactivated successfully. Jul 2 00:44:50.903150 systemd-logind[1733]: Removed session 3. Jul 2 00:44:50.925247 systemd[1]: Started sshd@3-172.31.27.140:22-139.178.89.65:33744.service. Jul 2 00:44:51.098114 sshd[1969]: Accepted publickey for core from 139.178.89.65 port 33744 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:44:51.101160 sshd[1969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:44:51.108549 systemd-logind[1733]: New session 4 of user core. Jul 2 00:44:51.109782 systemd[1]: Started session-4.scope. Jul 2 00:44:51.243936 sshd[1969]: pam_unix(sshd:session): session closed for user core Jul 2 00:44:51.249116 systemd-logind[1733]: Session 4 logged out. Waiting for processes to exit. Jul 2 00:44:51.249737 systemd[1]: sshd@3-172.31.27.140:22-139.178.89.65:33744.service: Deactivated successfully. Jul 2 00:44:51.250982 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 00:44:51.252438 systemd-logind[1733]: Removed session 4. Jul 2 00:44:51.272308 systemd[1]: Started sshd@4-172.31.27.140:22-139.178.89.65:33760.service. Jul 2 00:44:51.442414 sshd[1975]: Accepted publickey for core from 139.178.89.65 port 33760 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:44:51.444601 sshd[1975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:44:51.453733 systemd[1]: Started session-5.scope. Jul 2 00:44:51.455400 systemd-logind[1733]: New session 5 of user core. Jul 2 00:44:51.624819 sudo[1978]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 00:44:51.625843 sudo[1978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:44:51.649733 dbus-daemon[1723]: avc: received setenforce notice (enforcing=1) Jul 2 00:44:51.653438 sudo[1978]: pam_unix(sudo:session): session closed for user root Jul 2 00:44:51.677515 sshd[1975]: pam_unix(sshd:session): session closed for user core Jul 2 00:44:51.683079 systemd-logind[1733]: Session 5 logged out. Waiting for processes to exit. Jul 2 00:44:51.683705 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 00:44:51.684838 systemd[1]: sshd@4-172.31.27.140:22-139.178.89.65:33760.service: Deactivated successfully. Jul 2 00:44:51.686829 systemd-logind[1733]: Removed session 5. Jul 2 00:44:51.705813 systemd[1]: Started sshd@5-172.31.27.140:22-139.178.89.65:33770.service. Jul 2 00:44:51.879278 sshd[1982]: Accepted publickey for core from 139.178.89.65 port 33770 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:44:51.882424 sshd[1982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:44:51.890708 systemd-logind[1733]: New session 6 of user core. Jul 2 00:44:51.891032 systemd[1]: Started session-6.scope. Jul 2 00:44:51.999638 sudo[1986]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 00:44:52.001139 sudo[1986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:44:52.006293 sudo[1986]: pam_unix(sudo:session): session closed for user root Jul 2 00:44:52.015764 sudo[1985]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 00:44:52.016788 sudo[1985]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:44:52.034490 systemd[1]: Stopping audit-rules.service... Jul 2 00:44:52.034000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:44:52.038036 kernel: kauditd_printk_skb: 108 callbacks suppressed Jul 2 00:44:52.038096 kernel: audit: type=1305 audit(1719881092.034:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:44:52.042499 kernel: audit: type=1300 audit(1719881092.034:200): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcd1cd230 a2=420 a3=0 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.034000 audit[1989]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcd1cd230 a2=420 a3=0 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.034000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:44:52.052237 auditctl[1989]: No rules Jul 2 00:44:52.063595 kernel: audit: type=1327 audit(1719881092.034:200): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:44:52.063704 kernel: audit: type=1131 audit(1719881092.053:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.053244 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 00:44:52.053611 systemd[1]: Stopped audit-rules.service. Jul 2 00:44:52.060820 systemd[1]: Starting audit-rules.service... Jul 2 00:44:52.090834 augenrules[2006]: No rules Jul 2 00:44:52.092496 systemd[1]: Finished audit-rules.service. Jul 2 00:44:52.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.095401 sudo[1985]: pam_unix(sudo:session): session closed for user root Jul 2 00:44:52.094000 audit[1985]: USER_END pid=1985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.108760 kernel: audit: type=1130 audit(1719881092.091:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.108849 kernel: audit: type=1106 audit(1719881092.094:203): pid=1985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.108912 kernel: audit: type=1104 audit(1719881092.094:204): pid=1985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.094000 audit[1985]: CRED_DISP pid=1985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.119055 sshd[1982]: pam_unix(sshd:session): session closed for user core Jul 2 00:44:52.119000 audit[1982]: USER_END pid=1982 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:44:52.131994 systemd[1]: sshd@5-172.31.27.140:22-139.178.89.65:33770.service: Deactivated successfully. Jul 2 00:44:52.119000 audit[1982]: CRED_DISP pid=1982 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:44:52.140668 kernel: audit: type=1106 audit(1719881092.119:205): pid=1982 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:44:52.140797 kernel: audit: type=1104 audit(1719881092.119:206): pid=1982 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:44:52.133252 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 00:44:52.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.140:22-139.178.89.65:33770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.149741 systemd-logind[1733]: Session 6 logged out. Waiting for processes to exit. Jul 2 00:44:52.152416 kernel: audit: type=1131 audit(1719881092.130:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.140:22-139.178.89.65:33770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.151542 systemd[1]: Started sshd@6-172.31.27.140:22-139.178.89.65:33772.service. Jul 2 00:44:52.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.140:22-139.178.89.65:33772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.156764 systemd-logind[1733]: Removed session 6. Jul 2 00:44:52.322000 audit[2012]: USER_ACCT pid=2012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:44:52.323994 sshd[2012]: Accepted publickey for core from 139.178.89.65 port 33772 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:44:52.325000 audit[2012]: CRED_ACQ pid=2012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:44:52.325000 audit[2012]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9d16f40 a2=3 a3=1 items=0 ppid=1 pid=2012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.325000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:44:52.328152 sshd[2012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:44:52.336386 systemd-logind[1733]: New session 7 of user core. Jul 2 00:44:52.337365 systemd[1]: Started session-7.scope. Jul 2 00:44:52.345000 audit[2012]: USER_START pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:44:52.348000 audit[2014]: CRED_ACQ pid=2014 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:44:52.443000 audit[2015]: USER_ACCT pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.444294 sudo[2015]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 00:44:52.444000 audit[2015]: CRED_REFR pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.445417 sudo[2015]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:44:52.448000 audit[2015]: USER_START pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:44:52.493818 systemd[1]: Starting docker.service... Jul 2 00:44:52.571861 env[2025]: time="2024-07-02T00:44:52.571765131Z" level=info msg="Starting up" Jul 2 00:44:52.576535 env[2025]: time="2024-07-02T00:44:52.575136286Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:44:52.576752 env[2025]: time="2024-07-02T00:44:52.576713088Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:44:52.576925 env[2025]: time="2024-07-02T00:44:52.576892360Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 00:44:52.577034 env[2025]: time="2024-07-02T00:44:52.577006747Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:44:52.580507 env[2025]: time="2024-07-02T00:44:52.580418350Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:44:52.580507 env[2025]: time="2024-07-02T00:44:52.580481913Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:44:52.580755 env[2025]: time="2024-07-02T00:44:52.580527537Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 00:44:52.580755 env[2025]: time="2024-07-02T00:44:52.580549779Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:44:52.643951 env[2025]: time="2024-07-02T00:44:52.643884003Z" level=info msg="Loading containers: start." Jul 2 00:44:52.789000 audit[2056]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.789000 audit[2056]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffe5977c80 a2=0 a3=1 items=0 ppid=2025 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 00:44:52.792000 audit[2058]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.792000 audit[2058]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd331cdb0 a2=0 a3=1 items=0 ppid=2025 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 00:44:52.797000 audit[2060]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.797000 audit[2060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff979b0a0 a2=0 a3=1 items=0 ppid=2025 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.797000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:44:52.801000 audit[2062]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.801000 audit[2062]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdcecf2f0 a2=0 a3=1 items=0 ppid=2025 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.801000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:44:52.826000 audit[2064]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.826000 audit[2064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd9406a50 a2=0 a3=1 items=0 ppid=2025 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.826000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 00:44:52.856000 audit[2069]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.856000 audit[2069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd6b2da30 a2=0 a3=1 items=0 ppid=2025 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.856000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 00:44:52.879000 audit[2071]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.879000 audit[2071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcfb8e2f0 a2=0 a3=1 items=0 ppid=2025 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 00:44:52.883000 audit[2073]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.883000 audit[2073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd2e9f380 a2=0 a3=1 items=0 ppid=2025 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 00:44:52.887000 audit[2075]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.887000 audit[2075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffdf472170 a2=0 a3=1 items=0 ppid=2025 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:44:52.902000 audit[2079]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.902000 audit[2079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffed680330 a2=0 a3=1 items=0 ppid=2025 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.902000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:44:52.904000 audit[2080]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:52.904000 audit[2080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffce7daae0 a2=0 a3=1 items=0 ppid=2025 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:52.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:44:52.934501 kernel: Initializing XFRM netlink socket Jul 2 00:44:52.998060 env[2025]: time="2024-07-02T00:44:52.997990912Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 00:44:53.000903 (udev-worker)[2036]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:44:53.038000 audit[2088]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.038000 audit[2088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd532fd20 a2=0 a3=1 items=0 ppid=2025 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.038000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 00:44:53.063000 audit[2091]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.063000 audit[2091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffcb59c250 a2=0 a3=1 items=0 ppid=2025 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.063000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 00:44:53.069000 audit[2094]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.069000 audit[2094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd5c736a0 a2=0 a3=1 items=0 ppid=2025 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.069000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 00:44:53.073000 audit[2096]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.073000 audit[2096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe378bde0 a2=0 a3=1 items=0 ppid=2025 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.073000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 00:44:53.077000 audit[2098]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.077000 audit[2098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffff77dd00 a2=0 a3=1 items=0 ppid=2025 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.077000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 00:44:53.082000 audit[2100]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.082000 audit[2100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe2524a20 a2=0 a3=1 items=0 ppid=2025 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 00:44:53.086000 audit[2102]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.086000 audit[2102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffc4058d80 a2=0 a3=1 items=0 ppid=2025 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 00:44:53.108000 audit[2105]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.108000 audit[2105]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe2f16ea0 a2=0 a3=1 items=0 ppid=2025 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 00:44:53.113000 audit[2107]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.113000 audit[2107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffdfd2b3b0 a2=0 a3=1 items=0 ppid=2025 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:44:53.118000 audit[2109]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.118000 audit[2109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe73a49c0 a2=0 a3=1 items=0 ppid=2025 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.118000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:44:53.123000 audit[2111]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.123000 audit[2111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc39d3e10 a2=0 a3=1 items=0 ppid=2025 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 00:44:53.126244 systemd-networkd[1461]: docker0: Link UP Jul 2 00:44:53.140000 audit[2115]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.140000 audit[2115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff0a79550 a2=0 a3=1 items=0 ppid=2025 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:44:53.142000 audit[2116]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:44:53.142000 audit[2116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffce4a7c80 a2=0 a3=1 items=0 ppid=2025 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:44:53.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:44:53.145609 env[2025]: time="2024-07-02T00:44:53.145559966Z" level=info msg="Loading containers: done." Jul 2 00:44:53.188252 env[2025]: time="2024-07-02T00:44:53.188184119Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 00:44:53.188969 env[2025]: time="2024-07-02T00:44:53.188935490Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 00:44:53.189326 env[2025]: time="2024-07-02T00:44:53.189301151Z" level=info msg="Daemon has completed initialization" Jul 2 00:44:53.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:53.215993 systemd[1]: Started docker.service. Jul 2 00:44:53.225922 env[2025]: time="2024-07-02T00:44:53.225854451Z" level=info msg="API listen on /run/docker.sock" Jul 2 00:44:54.002409 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 00:44:54.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:54.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:54.015487 systemd[1]: Stopped kubelet.service. Jul 2 00:44:54.015643 systemd[1]: kubelet.service: Consumed 1.474s CPU time. Jul 2 00:44:54.018759 systemd[1]: Starting kubelet.service... Jul 2 00:44:54.650435 env[1742]: time="2024-07-02T00:44:54.649798973Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\"" Jul 2 00:44:54.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:44:54.751384 systemd[1]: Started kubelet.service. Jul 2 00:44:54.839132 kubelet[2159]: E0702 00:44:54.839038 2159 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:44:54.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:44:54.850427 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:44:54.850763 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:44:55.273545 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3263044485.mount: Deactivated successfully. Jul 2 00:44:56.962288 amazon-ssm-agent[1720]: 2024-07-02 00:44:56 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Jul 2 00:44:57.527667 env[1742]: time="2024-07-02T00:44:57.527608204Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:44:57.530581 env[1742]: time="2024-07-02T00:44:57.530533211Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:46bfddf397d499c68edd3a505a02ab6b7a77acc6cbab684122699693c44fdc8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:44:57.533933 env[1742]: time="2024-07-02T00:44:57.533868849Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:44:57.537651 env[1742]: time="2024-07-02T00:44:57.537602043Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f4d993b3d73cc0d59558be584b5b40785b4a96874bc76873b69d1dd818485e70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:44:57.539259 env[1742]: time="2024-07-02T00:44:57.539184124Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\" returns image reference \"sha256:46bfddf397d499c68edd3a505a02ab6b7a77acc6cbab684122699693c44fdc8a\"" Jul 2 00:44:57.556248 env[1742]: time="2024-07-02T00:44:57.556197749Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\"" Jul 2 00:45:00.266300 env[1742]: time="2024-07-02T00:45:00.266240149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:00.272281 env[1742]: time="2024-07-02T00:45:00.272225655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9df0eeeacdd8f3cd9f3c3a08fbdfd665da4283115b53bf8b5d434382c02230a8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:00.276174 env[1742]: time="2024-07-02T00:45:00.276126177Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:00.279294 env[1742]: time="2024-07-02T00:45:00.279233952Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:692fc3f88a60b3afc76492ad347306d34042000f56f230959e9367fd59c48b1e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:00.281134 env[1742]: time="2024-07-02T00:45:00.281061232Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\" returns image reference \"sha256:9df0eeeacdd8f3cd9f3c3a08fbdfd665da4283115b53bf8b5d434382c02230a8\"" Jul 2 00:45:00.299623 env[1742]: time="2024-07-02T00:45:00.299562392Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\"" Jul 2 00:45:01.850398 env[1742]: time="2024-07-02T00:45:01.850321162Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:01.853809 env[1742]: time="2024-07-02T00:45:01.853747173Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4d823a436d04c2aac5c8e0dd5a83efa81f1917a3c017feabc4917150cb90fa29,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:01.857482 env[1742]: time="2024-07-02T00:45:01.857412516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:01.860902 env[1742]: time="2024-07-02T00:45:01.860837395Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b91a4e45debd0d5336d9f533aefdf47d4b39b24071feb459e521709b9e4ec24f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:01.862773 env[1742]: time="2024-07-02T00:45:01.862725464Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\" returns image reference \"sha256:4d823a436d04c2aac5c8e0dd5a83efa81f1917a3c017feabc4917150cb90fa29\"" Jul 2 00:45:01.880726 env[1742]: time="2024-07-02T00:45:01.880659864Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\"" Jul 2 00:45:03.457132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3574159275.mount: Deactivated successfully. Jul 2 00:45:04.452229 env[1742]: time="2024-07-02T00:45:04.452137192Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:04.497940 env[1742]: time="2024-07-02T00:45:04.497872283Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a75156450625cf630b7b9b1e8b7d881969131638181257d0d67db0876a25b32f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:04.548792 env[1742]: time="2024-07-02T00:45:04.548734721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:04.601707 env[1742]: time="2024-07-02T00:45:04.601642462Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:88bacb3e1d6c0c37c6da95c6d6b8e30531d0b4d0ab540cc290b0af51fbfebd90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:04.603235 env[1742]: time="2024-07-02T00:45:04.603195894Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\" returns image reference \"sha256:a75156450625cf630b7b9b1e8b7d881969131638181257d0d67db0876a25b32f\"" Jul 2 00:45:04.620892 env[1742]: time="2024-07-02T00:45:04.620832729Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 00:45:05.102069 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 00:45:05.102422 systemd[1]: Stopped kubelet.service. Jul 2 00:45:05.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:05.107324 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 00:45:05.107470 kernel: audit: type=1130 audit(1719881105.101:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:05.106921 systemd[1]: Starting kubelet.service... Jul 2 00:45:05.121598 kernel: audit: type=1131 audit(1719881105.101:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:05.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:05.280711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount161349404.mount: Deactivated successfully. Jul 2 00:45:06.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:06.004564 systemd[1]: Started kubelet.service. Jul 2 00:45:06.021141 kernel: audit: type=1130 audit(1719881106.004:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:06.148050 kubelet[2192]: E0702 00:45:06.147958 2192 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:45:06.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:45:06.153071 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:45:06.153384 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:45:06.162559 kernel: audit: type=1131 audit(1719881106.152:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:45:07.348231 env[1742]: time="2024-07-02T00:45:07.348135460Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:07.435605 env[1742]: time="2024-07-02T00:45:07.435521461Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:07.530946 env[1742]: time="2024-07-02T00:45:07.530881352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:07.573801 env[1742]: time="2024-07-02T00:45:07.573743284Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:07.575928 env[1742]: time="2024-07-02T00:45:07.575868038Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Jul 2 00:45:07.595499 env[1742]: time="2024-07-02T00:45:07.595403251Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 00:45:09.199920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2551242225.mount: Deactivated successfully. Jul 2 00:45:09.414783 env[1742]: time="2024-07-02T00:45:09.414725009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:09.420136 env[1742]: time="2024-07-02T00:45:09.420085762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:09.423104 env[1742]: time="2024-07-02T00:45:09.423045657Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:09.425965 env[1742]: time="2024-07-02T00:45:09.425920072Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:09.427089 env[1742]: time="2024-07-02T00:45:09.427043794Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Jul 2 00:45:09.444369 env[1742]: time="2024-07-02T00:45:09.444292288Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Jul 2 00:45:10.010506 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3761944548.mount: Deactivated successfully. Jul 2 00:45:11.519647 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 00:45:11.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:11.529508 kernel: audit: type=1131 audit(1719881111.518:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:11.546000 audit: BPF prog-id=40 op=UNLOAD Jul 2 00:45:11.552072 kernel: audit: type=1334 audit(1719881111.546:251): prog-id=40 op=UNLOAD Jul 2 00:45:11.552168 kernel: audit: type=1334 audit(1719881111.546:252): prog-id=39 op=UNLOAD Jul 2 00:45:11.546000 audit: BPF prog-id=39 op=UNLOAD Jul 2 00:45:11.554463 kernel: audit: type=1334 audit(1719881111.546:253): prog-id=38 op=UNLOAD Jul 2 00:45:11.546000 audit: BPF prog-id=38 op=UNLOAD Jul 2 00:45:13.190984 env[1742]: time="2024-07-02T00:45:13.190914878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:13.194579 env[1742]: time="2024-07-02T00:45:13.194516870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:13.198156 env[1742]: time="2024-07-02T00:45:13.198097109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:13.201846 env[1742]: time="2024-07-02T00:45:13.201784430Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:13.203896 env[1742]: time="2024-07-02T00:45:13.203836217Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Jul 2 00:45:16.404708 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 00:45:16.405054 systemd[1]: Stopped kubelet.service. Jul 2 00:45:16.420927 kernel: audit: type=1130 audit(1719881116.403:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:16.421051 kernel: audit: type=1131 audit(1719881116.403:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:16.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:16.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:16.413299 systemd[1]: Starting kubelet.service... Jul 2 00:45:16.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:16.924004 systemd[1]: Started kubelet.service. Jul 2 00:45:16.941480 kernel: audit: type=1130 audit(1719881116.923:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:17.028006 kubelet[2276]: E0702 00:45:17.027926 2276 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:45:17.031696 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:45:17.032021 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:45:17.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:45:17.040484 kernel: audit: type=1131 audit(1719881117.031:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:45:21.983124 systemd[1]: Stopped kubelet.service. Jul 2 00:45:21.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:21.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:21.991503 kernel: audit: type=1130 audit(1719881121.982:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:21.999583 systemd[1]: Starting kubelet.service... Jul 2 00:45:22.006224 kernel: audit: type=1131 audit(1719881121.987:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:22.037363 systemd[1]: Reloading. Jul 2 00:45:22.188366 /usr/lib/systemd/system-generators/torcx-generator[2311]: time="2024-07-02T00:45:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:45:22.188430 /usr/lib/systemd/system-generators/torcx-generator[2311]: time="2024-07-02T00:45:22Z" level=info msg="torcx already run" Jul 2 00:45:22.414824 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:45:22.415075 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:45:22.454595 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:45:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629808 kernel: audit: type=1400 audit(1719881122.616:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629915 kernel: audit: type=1400 audit(1719881122.622:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636545 kernel: audit: type=1400 audit(1719881122.622:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.643215 kernel: audit: type=1400 audit(1719881122.622:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649921 kernel: audit: type=1400 audit(1719881122.622:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.656668 kernel: audit: type=1400 audit(1719881122.622:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.656759 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 00:45:22.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.664936 kernel: audit: type=1400 audit(1719881122.622:266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit: BPF prog-id=43 op=LOAD Jul 2 00:45:22.629000 audit: BPF prog-id=24 op=UNLOAD Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit: BPF prog-id=44 op=LOAD Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit: BPF prog-id=45 op=LOAD Jul 2 00:45:22.636000 audit: BPF prog-id=25 op=UNLOAD Jul 2 00:45:22.636000 audit: BPF prog-id=26 op=UNLOAD Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit: BPF prog-id=46 op=LOAD Jul 2 00:45:22.642000 audit: BPF prog-id=35 op=UNLOAD Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit: BPF prog-id=47 op=LOAD Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit: BPF prog-id=48 op=LOAD Jul 2 00:45:22.649000 audit: BPF prog-id=36 op=UNLOAD Jul 2 00:45:22.649000 audit: BPF prog-id=37 op=UNLOAD Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit: BPF prog-id=50 op=LOAD Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.667000 audit: BPF prog-id=28 op=UNLOAD Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit: BPF prog-id=52 op=LOAD Jul 2 00:45:22.668000 audit: BPF prog-id=29 op=UNLOAD Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.668000 audit: BPF prog-id=30 op=UNLOAD Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.671000 audit: BPF prog-id=55 op=LOAD Jul 2 00:45:22.671000 audit: BPF prog-id=33 op=UNLOAD Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.677000 audit: BPF prog-id=56 op=LOAD Jul 2 00:45:22.677000 audit: BPF prog-id=34 op=UNLOAD Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:22.680000 audit: BPF prog-id=57 op=LOAD Jul 2 00:45:22.680000 audit: BPF prog-id=32 op=UNLOAD Jul 2 00:45:22.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:22.709655 systemd[1]: Started kubelet.service. Jul 2 00:45:22.722777 systemd[1]: Stopping kubelet.service... Jul 2 00:45:22.723631 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 00:45:22.724020 systemd[1]: Stopped kubelet.service. Jul 2 00:45:22.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:22.727899 systemd[1]: Starting kubelet.service... Jul 2 00:45:23.322720 systemd[1]: Started kubelet.service. Jul 2 00:45:23.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:23.416016 kubelet[2374]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:45:23.416016 kubelet[2374]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 00:45:23.416016 kubelet[2374]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:45:23.416669 kubelet[2374]: I0702 00:45:23.416121 2374 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 00:45:24.191826 kubelet[2374]: I0702 00:45:24.191786 2374 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 00:45:24.192044 kubelet[2374]: I0702 00:45:24.192022 2374 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 00:45:24.192503 kubelet[2374]: I0702 00:45:24.192480 2374 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 00:45:24.235101 kubelet[2374]: E0702 00:45:24.235041 2374 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.140:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.236649 kubelet[2374]: I0702 00:45:24.236601 2374 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:45:24.252569 kubelet[2374]: I0702 00:45:24.252532 2374 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 00:45:24.254335 kubelet[2374]: I0702 00:45:24.254296 2374 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 00:45:24.254787 kubelet[2374]: I0702 00:45:24.254751 2374 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 00:45:24.255026 kubelet[2374]: I0702 00:45:24.255003 2374 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 00:45:24.255136 kubelet[2374]: I0702 00:45:24.255115 2374 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 00:45:24.257756 kubelet[2374]: I0702 00:45:24.257726 2374 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:45:24.262565 kubelet[2374]: I0702 00:45:24.262535 2374 kubelet.go:396] "Attempting to sync node with API server" Jul 2 00:45:24.262745 kubelet[2374]: I0702 00:45:24.262723 2374 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 00:45:24.262896 kubelet[2374]: I0702 00:45:24.262874 2374 kubelet.go:312] "Adding apiserver pod source" Jul 2 00:45:24.263463 kubelet[2374]: I0702 00:45:24.263396 2374 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 00:45:24.266560 kubelet[2374]: I0702 00:45:24.266506 2374 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 00:45:24.267193 kubelet[2374]: I0702 00:45:24.267148 2374 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 00:45:24.268417 kubelet[2374]: W0702 00:45:24.268360 2374 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 00:45:24.271727 kubelet[2374]: W0702 00:45:24.265871 2374 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.27.140:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.272019 kubelet[2374]: E0702 00:45:24.271993 2374 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.140:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.272361 kubelet[2374]: W0702 00:45:24.272295 2374 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.27.140:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-140&limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.272528 kubelet[2374]: E0702 00:45:24.272505 2374 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.140:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-140&limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.274372 kubelet[2374]: I0702 00:45:24.274330 2374 server.go:1256] "Started kubelet" Jul 2 00:45:24.284000 audit[2374]: AVC avc: denied { mac_admin } for pid=2374 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:24.284000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:45:24.284000 audit[2374]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b5b620 a1=4000cbfa40 a2=4000b5b5f0 a3=25 items=0 ppid=1 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.284000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:45:24.286037 kubelet[2374]: I0702 00:45:24.286004 2374 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 00:45:24.285000 audit[2374]: AVC avc: denied { mac_admin } for pid=2374 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:24.285000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:45:24.285000 audit[2374]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ced1a0 a1=4000cbfa58 a2=4000b5b6b0 a3=25 items=0 ppid=1 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.285000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:45:24.286700 kubelet[2374]: I0702 00:45:24.286668 2374 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 00:45:24.288040 kubelet[2374]: I0702 00:45:24.288004 2374 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 00:45:24.292000 audit[2384]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:24.292000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd6bb7260 a2=0 a3=1 items=0 ppid=2374 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 00:45:24.295001 kubelet[2374]: E0702 00:45:24.294950 2374 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 00:45:24.295000 audit[2385]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:24.295000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff789290 a2=0 a3=1 items=0 ppid=2374 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 00:45:24.298535 kubelet[2374]: I0702 00:45:24.298406 2374 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 00:45:24.299149 kubelet[2374]: I0702 00:45:24.299118 2374 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 00:45:24.299895 kubelet[2374]: I0702 00:45:24.299842 2374 server.go:461] "Adding debug handlers to kubelet server" Jul 2 00:45:24.301758 kubelet[2374]: I0702 00:45:24.301703 2374 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 00:45:24.302062 kubelet[2374]: I0702 00:45:24.302022 2374 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 00:45:24.301000 audit[2387]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:24.301000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe83e0af0 a2=0 a3=1 items=0 ppid=2374 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:45:24.302797 kubelet[2374]: E0702 00:45:24.302731 2374 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-140?timeout=10s\": dial tcp 172.31.27.140:6443: connect: connection refused" interval="200ms" Jul 2 00:45:24.305341 kubelet[2374]: I0702 00:45:24.305286 2374 factory.go:221] Registration of the systemd container factory successfully Jul 2 00:45:24.305510 kubelet[2374]: I0702 00:45:24.305435 2374 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 00:45:24.305611 kubelet[2374]: I0702 00:45:24.305309 2374 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 00:45:24.305870 kubelet[2374]: I0702 00:45:24.305848 2374 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 00:45:24.307000 audit[2389]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:24.307000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff150b220 a2=0 a3=1 items=0 ppid=2374 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:45:24.310017 kubelet[2374]: E0702 00:45:24.309952 2374 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.27.140:6443/api/v1/namespaces/default/events\": dial tcp 172.31.27.140:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-27-140.17de3ec52c44ba17 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-27-140,UID:ip-172-31-27-140,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-27-140,},FirstTimestamp:2024-07-02 00:45:24.274289175 +0000 UTC m=+0.933004929,LastTimestamp:2024-07-02 00:45:24.274289175 +0000 UTC m=+0.933004929,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-27-140,}" Jul 2 00:45:24.313114 kubelet[2374]: I0702 00:45:24.313059 2374 factory.go:221] Registration of the containerd container factory successfully Jul 2 00:45:24.321092 kubelet[2374]: W0702 00:45:24.321004 2374 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.27.140:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.321092 kubelet[2374]: E0702 00:45:24.321093 2374 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.140:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.334952 kubelet[2374]: I0702 00:45:24.334888 2374 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 00:45:24.334952 kubelet[2374]: I0702 00:45:24.334938 2374 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 00:45:24.335182 kubelet[2374]: I0702 00:45:24.334974 2374 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:45:24.339386 kubelet[2374]: I0702 00:45:24.339335 2374 policy_none.go:49] "None policy: Start" Jul 2 00:45:24.340783 kubelet[2374]: I0702 00:45:24.340754 2374 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 00:45:24.341092 kubelet[2374]: I0702 00:45:24.341071 2374 state_mem.go:35] "Initializing new in-memory state store" Jul 2 00:45:24.350777 systemd[1]: Created slice kubepods.slice. Jul 2 00:45:24.363000 audit[2395]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:24.363000 audit[2395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffcbc77100 a2=0 a3=1 items=0 ppid=2374 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 00:45:24.365397 kubelet[2374]: I0702 00:45:24.365353 2374 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 00:45:24.367574 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 00:45:24.367000 audit[2398]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:24.367000 audit[2398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc21cad50 a2=0 a3=1 items=0 ppid=2374 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 00:45:24.370000 audit[2397]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:24.370000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff04555c0 a2=0 a3=1 items=0 ppid=2374 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 00:45:24.372258 kubelet[2374]: I0702 00:45:24.372225 2374 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 00:45:24.372549 kubelet[2374]: I0702 00:45:24.372525 2374 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 00:45:24.372684 kubelet[2374]: I0702 00:45:24.372662 2374 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 00:45:24.372878 kubelet[2374]: E0702 00:45:24.372858 2374 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 00:45:24.374363 kubelet[2374]: W0702 00:45:24.374317 2374 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.27.140:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.374625 kubelet[2374]: E0702 00:45:24.374602 2374 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.140:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:24.374000 audit[2399]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:24.374000 audit[2399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcddb7350 a2=0 a3=1 items=0 ppid=2374 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 00:45:24.376000 audit[2401]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:24.376000 audit[2401]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc50a6f50 a2=0 a3=1 items=0 ppid=2374 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.376000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 00:45:24.381742 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 00:45:24.383000 audit[2403]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:24.383000 audit[2403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcd370200 a2=0 a3=1 items=0 ppid=2374 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.384000 audit[2402]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:24.384000 audit[2402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3fd6080 a2=0 a3=1 items=0 ppid=2374 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 00:45:24.386128 kubelet[2374]: I0702 00:45:24.386097 2374 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 00:45:24.385000 audit[2374]: AVC avc: denied { mac_admin } for pid=2374 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:24.385000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:45:24.385000 audit[2374]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e9b830 a1=4000ede570 a2=4000e9b800 a3=25 items=0 ppid=1 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.385000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:45:24.387653 kubelet[2374]: I0702 00:45:24.387611 2374 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 00:45:24.395580 kubelet[2374]: I0702 00:45:24.395533 2374 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 00:45:24.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 00:45:24.398672 kubelet[2374]: E0702 00:45:24.398637 2374 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-27-140\" not found" Jul 2 00:45:24.401000 audit[2404]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:24.401000 audit[2404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff755b9b0 a2=0 a3=1 items=0 ppid=2374 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:24.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 00:45:24.404357 kubelet[2374]: I0702 00:45:24.404320 2374 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-27-140" Jul 2 00:45:24.405326 kubelet[2374]: E0702 00:45:24.405298 2374 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.27.140:6443/api/v1/nodes\": dial tcp 172.31.27.140:6443: connect: connection refused" node="ip-172-31-27-140" Jul 2 00:45:24.474028 kubelet[2374]: I0702 00:45:24.473972 2374 topology_manager.go:215] "Topology Admit Handler" podUID="4ef7c3702fc1b67258660667241dbb71" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-27-140" Jul 2 00:45:24.476123 kubelet[2374]: I0702 00:45:24.476073 2374 topology_manager.go:215] "Topology Admit Handler" podUID="d58d9a5cd9153cf0aae48dbf2c723384" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:24.478512 kubelet[2374]: I0702 00:45:24.477949 2374 topology_manager.go:215] "Topology Admit Handler" podUID="f5f7f8f6475381feb4bfbfc4e383178e" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-27-140" Jul 2 00:45:24.487940 systemd[1]: Created slice kubepods-burstable-pod4ef7c3702fc1b67258660667241dbb71.slice. Jul 2 00:45:24.504223 kubelet[2374]: E0702 00:45:24.504168 2374 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-140?timeout=10s\": dial tcp 172.31.27.140:6443: connect: connection refused" interval="400ms" Jul 2 00:45:24.508266 kubelet[2374]: I0702 00:45:24.508220 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4ef7c3702fc1b67258660667241dbb71-ca-certs\") pod \"kube-apiserver-ip-172-31-27-140\" (UID: \"4ef7c3702fc1b67258660667241dbb71\") " pod="kube-system/kube-apiserver-ip-172-31-27-140" Jul 2 00:45:24.511937 systemd[1]: Created slice kubepods-burstable-podd58d9a5cd9153cf0aae48dbf2c723384.slice. Jul 2 00:45:24.530086 systemd[1]: Created slice kubepods-burstable-podf5f7f8f6475381feb4bfbfc4e383178e.slice. Jul 2 00:45:24.607936 kubelet[2374]: I0702 00:45:24.607892 2374 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-27-140" Jul 2 00:45:24.608374 kubelet[2374]: E0702 00:45:24.608345 2374 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.27.140:6443/api/v1/nodes\": dial tcp 172.31.27.140:6443: connect: connection refused" node="ip-172-31-27-140" Jul 2 00:45:24.609615 kubelet[2374]: I0702 00:45:24.609586 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4ef7c3702fc1b67258660667241dbb71-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-140\" (UID: \"4ef7c3702fc1b67258660667241dbb71\") " pod="kube-system/kube-apiserver-ip-172-31-27-140" Jul 2 00:45:24.609733 kubelet[2374]: I0702 00:45:24.609653 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4ef7c3702fc1b67258660667241dbb71-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-140\" (UID: \"4ef7c3702fc1b67258660667241dbb71\") " pod="kube-system/kube-apiserver-ip-172-31-27-140" Jul 2 00:45:24.609733 kubelet[2374]: I0702 00:45:24.609705 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f5f7f8f6475381feb4bfbfc4e383178e-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-140\" (UID: \"f5f7f8f6475381feb4bfbfc4e383178e\") " pod="kube-system/kube-scheduler-ip-172-31-27-140" Jul 2 00:45:24.609871 kubelet[2374]: I0702 00:45:24.609755 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:24.609871 kubelet[2374]: I0702 00:45:24.609800 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:24.609871 kubelet[2374]: I0702 00:45:24.609853 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:24.610042 kubelet[2374]: I0702 00:45:24.609898 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:24.610042 kubelet[2374]: I0702 00:45:24.609946 2374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:24.813628 env[1742]: time="2024-07-02T00:45:24.812512996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-140,Uid:4ef7c3702fc1b67258660667241dbb71,Namespace:kube-system,Attempt:0,}" Jul 2 00:45:24.826500 env[1742]: time="2024-07-02T00:45:24.826354785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-140,Uid:d58d9a5cd9153cf0aae48dbf2c723384,Namespace:kube-system,Attempt:0,}" Jul 2 00:45:24.836675 env[1742]: time="2024-07-02T00:45:24.836607175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-140,Uid:f5f7f8f6475381feb4bfbfc4e383178e,Namespace:kube-system,Attempt:0,}" Jul 2 00:45:24.905892 kubelet[2374]: E0702 00:45:24.905774 2374 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-140?timeout=10s\": dial tcp 172.31.27.140:6443: connect: connection refused" interval="800ms" Jul 2 00:45:25.010667 kubelet[2374]: I0702 00:45:25.010351 2374 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-27-140" Jul 2 00:45:25.011093 kubelet[2374]: E0702 00:45:25.011047 2374 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.27.140:6443/api/v1/nodes\": dial tcp 172.31.27.140:6443: connect: connection refused" node="ip-172-31-27-140" Jul 2 00:45:25.700850 kubelet[2374]: W0702 00:45:25.700780 2374 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.27.140:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:25.700850 kubelet[2374]: E0702 00:45:25.700850 2374 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.140:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:25.706486 kubelet[2374]: E0702 00:45:25.706410 2374 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-140?timeout=10s\": dial tcp 172.31.27.140:6443: connect: connection refused" interval="1.6s" Jul 2 00:45:25.763405 kubelet[2374]: W0702 00:45:25.763338 2374 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.27.140:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:25.763405 kubelet[2374]: E0702 00:45:25.763407 2374 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.140:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:25.813254 kubelet[2374]: W0702 00:45:25.813135 2374 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.27.140:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-140&limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:25.813254 kubelet[2374]: E0702 00:45:25.813204 2374 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.140:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-140&limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:25.814059 kubelet[2374]: I0702 00:45:25.813998 2374 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-27-140" Jul 2 00:45:25.814520 kubelet[2374]: E0702 00:45:25.814487 2374 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.27.140:6443/api/v1/nodes\": dial tcp 172.31.27.140:6443: connect: connection refused" node="ip-172-31-27-140" Jul 2 00:45:25.857318 kubelet[2374]: W0702 00:45:25.857184 2374 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.27.140:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:25.857318 kubelet[2374]: E0702 00:45:25.857251 2374 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.140:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:26.058329 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount41465586.mount: Deactivated successfully. Jul 2 00:45:26.070198 env[1742]: time="2024-07-02T00:45:26.070124159Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.076591 env[1742]: time="2024-07-02T00:45:26.076514384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.080116 env[1742]: time="2024-07-02T00:45:26.080037490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.083562 env[1742]: time="2024-07-02T00:45:26.082780519Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.086328 env[1742]: time="2024-07-02T00:45:26.086262638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.089334 env[1742]: time="2024-07-02T00:45:26.089274101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.092247 env[1742]: time="2024-07-02T00:45:26.092201488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.097498 env[1742]: time="2024-07-02T00:45:26.096874251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.103698 env[1742]: time="2024-07-02T00:45:26.103638739Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.106908 env[1742]: time="2024-07-02T00:45:26.106845293Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.108835 env[1742]: time="2024-07-02T00:45:26.108761737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.111689 env[1742]: time="2024-07-02T00:45:26.111607870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:26.175390 env[1742]: time="2024-07-02T00:45:26.175263360Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:45:26.175390 env[1742]: time="2024-07-02T00:45:26.175336834Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:45:26.175703 env[1742]: time="2024-07-02T00:45:26.175364267Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:45:26.175703 env[1742]: time="2024-07-02T00:45:26.175650312Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/383588a0c4763d95d6bff25b1b3aab39ae0531b48cbe00583dbbd64cf0de3670 pid=2420 runtime=io.containerd.runc.v2 Jul 2 00:45:26.183672 env[1742]: time="2024-07-02T00:45:26.183557939Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:45:26.184002 env[1742]: time="2024-07-02T00:45:26.183898274Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:45:26.184226 env[1742]: time="2024-07-02T00:45:26.184162049Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:45:26.184755 env[1742]: time="2024-07-02T00:45:26.184688927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ebce4a0ee0fa36e7880e06f6e8fd4c7ccb9ea15bd1b32fc04492cf0cc00e413 pid=2419 runtime=io.containerd.runc.v2 Jul 2 00:45:26.200311 systemd[1]: Started cri-containerd-383588a0c4763d95d6bff25b1b3aab39ae0531b48cbe00583dbbd64cf0de3670.scope. Jul 2 00:45:26.219097 env[1742]: time="2024-07-02T00:45:26.217382324Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:45:26.219097 env[1742]: time="2024-07-02T00:45:26.217974861Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:45:26.219097 env[1742]: time="2024-07-02T00:45:26.218140658Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:45:26.232953 systemd[1]: Started cri-containerd-6ebce4a0ee0fa36e7880e06f6e8fd4c7ccb9ea15bd1b32fc04492cf0cc00e413.scope. Jul 2 00:45:26.242341 env[1742]: time="2024-07-02T00:45:26.222405387Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b53f547ea2173e4011100f1def91accd4d7d6917cd1eb8375760a5dcd1c1793e pid=2441 runtime=io.containerd.runc.v2 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.255000 audit: BPF prog-id=58 op=LOAD Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2420 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333538386130633437363364393564366266663235623162336161 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2420 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333538386130633437363364393564366266663235623162336161 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit: BPF prog-id=59 op=LOAD Jul 2 00:45:26.256000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2420 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333538386130633437363364393564366266663235623162336161 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit: BPF prog-id=60 op=LOAD Jul 2 00:45:26.256000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2420 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333538386130633437363364393564366266663235623162336161 Jul 2 00:45:26.256000 audit: BPF prog-id=60 op=UNLOAD Jul 2 00:45:26.256000 audit: BPF prog-id=59 op=UNLOAD Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.256000 audit: BPF prog-id=61 op=LOAD Jul 2 00:45:26.256000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2420 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333538386130633437363364393564366266663235623162336161 Jul 2 00:45:26.281568 systemd[1]: Started cri-containerd-b53f547ea2173e4011100f1def91accd4d7d6917cd1eb8375760a5dcd1c1793e.scope. Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.296000 audit: BPF prog-id=62 op=LOAD Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2419 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665626365346130656530666133366537383830653036663665386664 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2419 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665626365346130656530666133366537383830653036663665386664 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit: BPF prog-id=63 op=LOAD Jul 2 00:45:26.297000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2419 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665626365346130656530666133366537383830653036663665386664 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit: BPF prog-id=64 op=LOAD Jul 2 00:45:26.297000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2419 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665626365346130656530666133366537383830653036663665386664 Jul 2 00:45:26.297000 audit: BPF prog-id=64 op=UNLOAD Jul 2 00:45:26.297000 audit: BPF prog-id=63 op=UNLOAD Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.297000 audit: BPF prog-id=65 op=LOAD Jul 2 00:45:26.297000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2419 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665626365346130656530666133366537383830653036663665386664 Jul 2 00:45:26.338823 env[1742]: time="2024-07-02T00:45:26.338671662Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-140,Uid:4ef7c3702fc1b67258660667241dbb71,Namespace:kube-system,Attempt:0,} returns sandbox id \"383588a0c4763d95d6bff25b1b3aab39ae0531b48cbe00583dbbd64cf0de3670\"" Jul 2 00:45:26.356021 env[1742]: time="2024-07-02T00:45:26.355956148Z" level=info msg="CreateContainer within sandbox \"383588a0c4763d95d6bff25b1b3aab39ae0531b48cbe00583dbbd64cf0de3670\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.386000 audit: BPF prog-id=66 op=LOAD Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2441 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235336635343765613231373365343031313130306631646566393161 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2441 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235336635343765613231373365343031313130306631646566393161 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit: BPF prog-id=67 op=LOAD Jul 2 00:45:26.388000 audit[2483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2441 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235336635343765613231373365343031313130306631646566393161 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit: BPF prog-id=68 op=LOAD Jul 2 00:45:26.388000 audit[2483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2441 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235336635343765613231373365343031313130306631646566393161 Jul 2 00:45:26.388000 audit: BPF prog-id=68 op=UNLOAD Jul 2 00:45:26.388000 audit: BPF prog-id=67 op=UNLOAD Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.388000 audit: BPF prog-id=69 op=LOAD Jul 2 00:45:26.388000 audit[2483]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2441 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235336635343765613231373365343031313130306631646566393161 Jul 2 00:45:26.407378 env[1742]: time="2024-07-02T00:45:26.407310895Z" level=info msg="CreateContainer within sandbox \"383588a0c4763d95d6bff25b1b3aab39ae0531b48cbe00583dbbd64cf0de3670\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"0c981ef77e3b2df387555dd057a027adf32dbac12e9dee545b6ecee3e8916994\"" Jul 2 00:45:26.408823 env[1742]: time="2024-07-02T00:45:26.408760837Z" level=info msg="StartContainer for \"0c981ef77e3b2df387555dd057a027adf32dbac12e9dee545b6ecee3e8916994\"" Jul 2 00:45:26.409862 env[1742]: time="2024-07-02T00:45:26.409810271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-140,Uid:d58d9a5cd9153cf0aae48dbf2c723384,Namespace:kube-system,Attempt:0,} returns sandbox id \"6ebce4a0ee0fa36e7880e06f6e8fd4c7ccb9ea15bd1b32fc04492cf0cc00e413\"" Jul 2 00:45:26.415699 env[1742]: time="2024-07-02T00:45:26.415629257Z" level=info msg="CreateContainer within sandbox \"6ebce4a0ee0fa36e7880e06f6e8fd4c7ccb9ea15bd1b32fc04492cf0cc00e413\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 00:45:26.419207 kubelet[2374]: E0702 00:45:26.419130 2374 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.140:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.140:6443: connect: connection refused Jul 2 00:45:26.441230 env[1742]: time="2024-07-02T00:45:26.441163926Z" level=info msg="CreateContainer within sandbox \"6ebce4a0ee0fa36e7880e06f6e8fd4c7ccb9ea15bd1b32fc04492cf0cc00e413\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5\"" Jul 2 00:45:26.442163 env[1742]: time="2024-07-02T00:45:26.442066964Z" level=info msg="StartContainer for \"6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5\"" Jul 2 00:45:26.455043 env[1742]: time="2024-07-02T00:45:26.454983582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-140,Uid:f5f7f8f6475381feb4bfbfc4e383178e,Namespace:kube-system,Attempt:0,} returns sandbox id \"b53f547ea2173e4011100f1def91accd4d7d6917cd1eb8375760a5dcd1c1793e\"" Jul 2 00:45:26.460186 update_engine[1736]: I0702 00:45:26.460134 1736 update_attempter.cc:509] Updating boot flags... Jul 2 00:45:26.461347 env[1742]: time="2024-07-02T00:45:26.461281052Z" level=info msg="CreateContainer within sandbox \"b53f547ea2173e4011100f1def91accd4d7d6917cd1eb8375760a5dcd1c1793e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 00:45:26.479819 systemd[1]: Started cri-containerd-0c981ef77e3b2df387555dd057a027adf32dbac12e9dee545b6ecee3e8916994.scope. Jul 2 00:45:26.511588 env[1742]: time="2024-07-02T00:45:26.511387408Z" level=info msg="CreateContainer within sandbox \"b53f547ea2173e4011100f1def91accd4d7d6917cd1eb8375760a5dcd1c1793e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611\"" Jul 2 00:45:26.518939 env[1742]: time="2024-07-02T00:45:26.518867214Z" level=info msg="StartContainer for \"c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611\"" Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.544000 audit: BPF prog-id=70 op=LOAD Jul 2 00:45:26.549578 systemd[1]: Started cri-containerd-6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5.scope. Jul 2 00:45:26.553000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.553000 audit[2539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2420 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393831656637376533623264663338373535356464303537613032 Jul 2 00:45:26.553000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.553000 audit[2539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2420 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393831656637376533623264663338373535356464303537613032 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit: BPF prog-id=71 op=LOAD Jul 2 00:45:26.554000 audit[2539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2420 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393831656637376533623264663338373535356464303537613032 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit: BPF prog-id=72 op=LOAD Jul 2 00:45:26.554000 audit[2539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2420 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393831656637376533623264663338373535356464303537613032 Jul 2 00:45:26.554000 audit: BPF prog-id=72 op=UNLOAD Jul 2 00:45:26.554000 audit: BPF prog-id=71 op=UNLOAD Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.554000 audit: BPF prog-id=73 op=LOAD Jul 2 00:45:26.554000 audit[2539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2420 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393831656637376533623264663338373535356464303537613032 Jul 2 00:45:26.620425 systemd[1]: Started cri-containerd-c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611.scope. Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.659000 audit: BPF prog-id=74 op=LOAD Jul 2 00:45:26.664000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.664000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2419 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393165623964656539646662303533356539363039613263343037 Jul 2 00:45:26.664000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.664000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2419 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393165623964656539646662303533356539363039613263343037 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit: BPF prog-id=75 op=LOAD Jul 2 00:45:26.665000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2419 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393165623964656539646662303533356539363039613263343037 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.665000 audit: BPF prog-id=76 op=LOAD Jul 2 00:45:26.665000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2419 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393165623964656539646662303533356539363039613263343037 Jul 2 00:45:26.665000 audit: BPF prog-id=76 op=UNLOAD Jul 2 00:45:26.666000 audit: BPF prog-id=75 op=UNLOAD Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.666000 audit: BPF prog-id=77 op=LOAD Jul 2 00:45:26.666000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2419 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393165623964656539646662303533356539363039613263343037 Jul 2 00:45:26.713290 env[1742]: time="2024-07-02T00:45:26.713026982Z" level=info msg="StartContainer for \"0c981ef77e3b2df387555dd057a027adf32dbac12e9dee545b6ecee3e8916994\" returns successfully" Jul 2 00:45:26.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.762000 audit: BPF prog-id=78 op=LOAD Jul 2 00:45:26.763000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.763000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2441 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353666303566616263613631306263323864646134393230366438 Jul 2 00:45:26.763000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.763000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2441 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353666303566616263613631306263323864646134393230366438 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit: BPF prog-id=79 op=LOAD Jul 2 00:45:26.764000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2441 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353666303566616263613631306263323864646134393230366438 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit: BPF prog-id=80 op=LOAD Jul 2 00:45:26.764000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2441 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353666303566616263613631306263323864646134393230366438 Jul 2 00:45:26.764000 audit: BPF prog-id=80 op=UNLOAD Jul 2 00:45:26.764000 audit: BPF prog-id=79 op=UNLOAD Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:26.764000 audit: BPF prog-id=81 op=LOAD Jul 2 00:45:26.764000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2441 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:26.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353666303566616263613631306263323864646134393230366438 Jul 2 00:45:26.778385 env[1742]: time="2024-07-02T00:45:26.776648964Z" level=info msg="StartContainer for \"6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5\" returns successfully" Jul 2 00:45:27.000997 amazon-ssm-agent[1720]: 2024-07-02 00:45:27 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Jul 2 00:45:27.077337 env[1742]: time="2024-07-02T00:45:27.077246449Z" level=info msg="StartContainer for \"c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611\" returns successfully" Jul 2 00:45:27.417081 kubelet[2374]: I0702 00:45:27.416942 2374 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-27-140" Jul 2 00:45:31.055000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.057316 kernel: kauditd_printk_skb: 619 callbacks suppressed Jul 2 00:45:31.057411 kernel: audit: type=1400 audit(1719881131.055:527): avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.055000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000400570 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:31.078059 kernel: audit: type=1300 audit(1719881131.055:527): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000400570 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:31.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:31.090023 kernel: audit: type=1327 audit(1719881131.055:527): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:31.065000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.098415 kernel: audit: type=1400 audit(1719881131.065:528): avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.065000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400050c520 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:31.109024 kernel: audit: type=1300 audit(1719881131.065:528): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400050c520 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:31.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:31.118227 kernel: audit: type=1327 audit(1719881131.065:528): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:31.086000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.126714 kernel: audit: type=1400 audit(1719881131.086:529): avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.086000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40050c8600 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:45:31.137189 kernel: audit: type=1300 audit(1719881131.086:529): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40050c8600 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:45:31.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:45:31.148302 kernel: audit: type=1327 audit(1719881131.086:529): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:45:31.148420 kernel: audit: type=1400 audit(1719881131.086:530): avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.086000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.086000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4002b84c20 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:45:31.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:45:31.089000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.089000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40050c8780 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:45:31.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:45:31.113000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.113000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=56 a1=40050c8e10 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:45:31.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:45:31.113000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.113000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=56 a1=4002b85720 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:45:31.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:45:31.113000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:31.113000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=56 a1=40050c8f00 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:45:31.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:45:31.276388 kubelet[2374]: I0702 00:45:31.276346 2374 apiserver.go:52] "Watching apiserver" Jul 2 00:45:31.406923 kubelet[2374]: I0702 00:45:31.406786 2374 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 00:45:31.541126 kubelet[2374]: E0702 00:45:31.541083 2374 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-27-140\" not found" node="ip-172-31-27-140" Jul 2 00:45:31.581236 kubelet[2374]: I0702 00:45:31.581155 2374 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-27-140" Jul 2 00:45:34.531857 systemd[1]: Reloading. Jul 2 00:45:34.660259 /usr/lib/systemd/system-generators/torcx-generator[2763]: time="2024-07-02T00:45:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:45:34.661678 /usr/lib/systemd/system-generators/torcx-generator[2763]: time="2024-07-02T00:45:34Z" level=info msg="torcx already run" Jul 2 00:45:34.858069 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:45:34.858913 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:45:34.901180 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit: BPF prog-id=82 op=LOAD Jul 2 00:45:35.108000 audit: BPF prog-id=43 op=UNLOAD Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit: BPF prog-id=83 op=LOAD Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.109000 audit: BPF prog-id=84 op=LOAD Jul 2 00:45:35.109000 audit: BPF prog-id=44 op=UNLOAD Jul 2 00:45:35.109000 audit: BPF prog-id=45 op=UNLOAD Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.112000 audit: BPF prog-id=85 op=LOAD Jul 2 00:45:35.112000 audit: BPF prog-id=70 op=UNLOAD Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.115000 audit: BPF prog-id=86 op=LOAD Jul 2 00:45:35.115000 audit: BPF prog-id=66 op=UNLOAD Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.117000 audit: BPF prog-id=87 op=LOAD Jul 2 00:45:35.117000 audit: BPF prog-id=58 op=UNLOAD Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.122000 audit: BPF prog-id=88 op=LOAD Jul 2 00:45:35.122000 audit: BPF prog-id=46 op=UNLOAD Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit: BPF prog-id=89 op=LOAD Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.123000 audit: BPF prog-id=90 op=LOAD Jul 2 00:45:35.123000 audit: BPF prog-id=47 op=UNLOAD Jul 2 00:45:35.123000 audit: BPF prog-id=48 op=UNLOAD Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.125000 audit: BPF prog-id=91 op=LOAD Jul 2 00:45:35.125000 audit: BPF prog-id=49 op=UNLOAD Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.127000 audit: BPF prog-id=92 op=LOAD Jul 2 00:45:35.127000 audit: BPF prog-id=78 op=UNLOAD Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit: BPF prog-id=93 op=LOAD Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.130000 audit: BPF prog-id=94 op=LOAD Jul 2 00:45:35.130000 audit: BPF prog-id=50 op=UNLOAD Jul 2 00:45:35.130000 audit: BPF prog-id=51 op=UNLOAD Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.131000 audit: BPF prog-id=95 op=LOAD Jul 2 00:45:35.132000 audit: BPF prog-id=52 op=UNLOAD Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit: BPF prog-id=96 op=LOAD Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.132000 audit: BPF prog-id=97 op=LOAD Jul 2 00:45:35.132000 audit: BPF prog-id=53 op=UNLOAD Jul 2 00:45:35.132000 audit: BPF prog-id=54 op=UNLOAD Jul 2 00:45:35.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.136000 audit: BPF prog-id=98 op=LOAD Jul 2 00:45:35.136000 audit: BPF prog-id=55 op=UNLOAD Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.138000 audit: BPF prog-id=99 op=LOAD Jul 2 00:45:35.138000 audit: BPF prog-id=62 op=UNLOAD Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.139000 audit: BPF prog-id=100 op=LOAD Jul 2 00:45:35.140000 audit: BPF prog-id=74 op=UNLOAD Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.145000 audit: BPF prog-id=101 op=LOAD Jul 2 00:45:35.145000 audit: BPF prog-id=56 op=UNLOAD Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.148000 audit: BPF prog-id=102 op=LOAD Jul 2 00:45:35.148000 audit: BPF prog-id=57 op=UNLOAD Jul 2 00:45:35.189992 systemd[1]: Stopping kubelet.service... Jul 2 00:45:35.209214 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 00:45:35.209647 systemd[1]: Stopped kubelet.service. Jul 2 00:45:35.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:35.209752 systemd[1]: kubelet.service: Consumed 1.705s CPU time. Jul 2 00:45:35.213162 systemd[1]: Starting kubelet.service... Jul 2 00:45:35.562369 systemd[1]: Started kubelet.service. Jul 2 00:45:35.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:35.710345 kubelet[2820]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:45:35.710345 kubelet[2820]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 00:45:35.710345 kubelet[2820]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:45:35.710345 kubelet[2820]: I0702 00:45:35.709172 2820 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 00:45:35.722133 kubelet[2820]: I0702 00:45:35.721698 2820 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 00:45:35.722133 kubelet[2820]: I0702 00:45:35.721770 2820 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 00:45:35.722497 kubelet[2820]: I0702 00:45:35.722284 2820 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 00:45:35.726215 kubelet[2820]: I0702 00:45:35.726171 2820 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 00:45:35.729869 kubelet[2820]: I0702 00:45:35.729824 2820 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:45:35.754637 kubelet[2820]: I0702 00:45:35.754582 2820 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 00:45:35.755155 kubelet[2820]: I0702 00:45:35.755119 2820 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 00:45:35.756340 kubelet[2820]: I0702 00:45:35.756250 2820 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 00:45:35.756570 kubelet[2820]: I0702 00:45:35.756370 2820 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 00:45:35.756570 kubelet[2820]: I0702 00:45:35.756397 2820 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 00:45:35.756570 kubelet[2820]: I0702 00:45:35.756511 2820 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:45:35.756783 kubelet[2820]: I0702 00:45:35.756683 2820 kubelet.go:396] "Attempting to sync node with API server" Jul 2 00:45:35.756783 kubelet[2820]: I0702 00:45:35.756710 2820 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 00:45:35.756783 kubelet[2820]: I0702 00:45:35.756748 2820 kubelet.go:312] "Adding apiserver pod source" Jul 2 00:45:35.756783 kubelet[2820]: I0702 00:45:35.756779 2820 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 00:45:35.758319 kubelet[2820]: I0702 00:45:35.758270 2820 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 00:45:35.758708 kubelet[2820]: I0702 00:45:35.758656 2820 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 00:45:35.759476 kubelet[2820]: I0702 00:45:35.759392 2820 server.go:1256] "Started kubelet" Jul 2 00:45:35.765000 audit[2820]: AVC avc: denied { mac_admin } for pid=2820 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.765000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:45:35.765000 audit[2820]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000685bf0 a1=4000767830 a2=4000685b90 a3=25 items=0 ppid=1 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:35.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:45:35.767542 kubelet[2820]: I0702 00:45:35.767497 2820 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 00:45:35.767647 kubelet[2820]: I0702 00:45:35.767599 2820 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 00:45:35.767712 kubelet[2820]: I0702 00:45:35.767664 2820 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 00:45:35.766000 audit[2820]: AVC avc: denied { mac_admin } for pid=2820 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:35.766000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:45:35.766000 audit[2820]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007951e0 a1=4000767848 a2=40005ae3f0 a3=25 items=0 ppid=1 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:35.766000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:45:35.776723 kubelet[2820]: I0702 00:45:35.776676 2820 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 00:45:35.778145 kubelet[2820]: I0702 00:45:35.778105 2820 server.go:461] "Adding debug handlers to kubelet server" Jul 2 00:45:35.780082 kubelet[2820]: I0702 00:45:35.780039 2820 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 00:45:35.780373 kubelet[2820]: I0702 00:45:35.780346 2820 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 00:45:35.792125 kubelet[2820]: I0702 00:45:35.789836 2820 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 00:45:35.792125 kubelet[2820]: I0702 00:45:35.790870 2820 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 00:45:35.792125 kubelet[2820]: I0702 00:45:35.791130 2820 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 00:45:35.824638 kubelet[2820]: I0702 00:45:35.821652 2820 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 00:45:35.824638 kubelet[2820]: I0702 00:45:35.823743 2820 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 00:45:35.824638 kubelet[2820]: I0702 00:45:35.823776 2820 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 00:45:35.824638 kubelet[2820]: I0702 00:45:35.823809 2820 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 00:45:35.824638 kubelet[2820]: E0702 00:45:35.823896 2820 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 00:45:35.867382 kubelet[2820]: I0702 00:45:35.867343 2820 factory.go:221] Registration of the containerd container factory successfully Jul 2 00:45:35.875160 kubelet[2820]: I0702 00:45:35.875126 2820 factory.go:221] Registration of the systemd container factory successfully Jul 2 00:45:35.881644 kubelet[2820]: I0702 00:45:35.881597 2820 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 00:45:35.887290 kubelet[2820]: E0702 00:45:35.887235 2820 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 00:45:35.928864 kubelet[2820]: E0702 00:45:35.928816 2820 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 00:45:35.943040 kubelet[2820]: I0702 00:45:35.943001 2820 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-27-140" Jul 2 00:45:35.984458 kubelet[2820]: I0702 00:45:35.984399 2820 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-27-140" Jul 2 00:45:35.987490 kubelet[2820]: I0702 00:45:35.985002 2820 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-27-140" Jul 2 00:45:36.130137 kubelet[2820]: E0702 00:45:36.130008 2820 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 00:45:36.143704 kubelet[2820]: I0702 00:45:36.143665 2820 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 00:45:36.143931 kubelet[2820]: I0702 00:45:36.143908 2820 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 00:45:36.144054 kubelet[2820]: I0702 00:45:36.144034 2820 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:45:36.144428 kubelet[2820]: I0702 00:45:36.144405 2820 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 00:45:36.144622 kubelet[2820]: I0702 00:45:36.144599 2820 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 00:45:36.144732 kubelet[2820]: I0702 00:45:36.144711 2820 policy_none.go:49] "None policy: Start" Jul 2 00:45:36.148104 kubelet[2820]: I0702 00:45:36.148068 2820 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 00:45:36.148307 kubelet[2820]: I0702 00:45:36.148286 2820 state_mem.go:35] "Initializing new in-memory state store" Jul 2 00:45:36.148825 kubelet[2820]: I0702 00:45:36.148800 2820 state_mem.go:75] "Updated machine memory state" Jul 2 00:45:36.167034 kubelet[2820]: I0702 00:45:36.166998 2820 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 00:45:36.178520 kernel: kauditd_printk_skb: 268 callbacks suppressed Jul 2 00:45:36.178666 kernel: audit: type=1400 audit(1719881136.169:783): avc: denied { mac_admin } for pid=2820 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:36.169000 audit[2820]: AVC avc: denied { mac_admin } for pid=2820 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:36.180438 kubelet[2820]: I0702 00:45:36.180388 2820 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 00:45:36.181195 kubelet[2820]: I0702 00:45:36.181079 2820 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 00:45:36.169000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:45:36.186102 kernel: audit: type=1401 audit(1719881136.169:783): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:45:36.191518 kernel: audit: type=1300 audit(1719881136.169:783): arch=c00000b7 syscall=5 success=no exit=-22 a0=400072ab40 a1=4000eed950 a2=400072ab10 a3=25 items=0 ppid=1 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:36.169000 audit[2820]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400072ab40 a1=4000eed950 a2=400072ab10 a3=25 items=0 ppid=1 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:36.169000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:45:36.211101 kernel: audit: type=1327 audit(1719881136.169:783): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:45:36.531023 kubelet[2820]: I0702 00:45:36.530979 2820 topology_manager.go:215] "Topology Admit Handler" podUID="4ef7c3702fc1b67258660667241dbb71" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-27-140" Jul 2 00:45:36.531307 kubelet[2820]: I0702 00:45:36.531284 2820 topology_manager.go:215] "Topology Admit Handler" podUID="d58d9a5cd9153cf0aae48dbf2c723384" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:36.531577 kubelet[2820]: I0702 00:45:36.531554 2820 topology_manager.go:215] "Topology Admit Handler" podUID="f5f7f8f6475381feb4bfbfc4e383178e" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-27-140" Jul 2 00:45:36.604234 kubelet[2820]: I0702 00:45:36.604173 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:36.604636 kubelet[2820]: I0702 00:45:36.604559 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f5f7f8f6475381feb4bfbfc4e383178e-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-140\" (UID: \"f5f7f8f6475381feb4bfbfc4e383178e\") " pod="kube-system/kube-scheduler-ip-172-31-27-140" Jul 2 00:45:36.604948 kubelet[2820]: I0702 00:45:36.604921 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4ef7c3702fc1b67258660667241dbb71-ca-certs\") pod \"kube-apiserver-ip-172-31-27-140\" (UID: \"4ef7c3702fc1b67258660667241dbb71\") " pod="kube-system/kube-apiserver-ip-172-31-27-140" Jul 2 00:45:36.605192 kubelet[2820]: I0702 00:45:36.605122 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4ef7c3702fc1b67258660667241dbb71-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-140\" (UID: \"4ef7c3702fc1b67258660667241dbb71\") " pod="kube-system/kube-apiserver-ip-172-31-27-140" Jul 2 00:45:36.605419 kubelet[2820]: I0702 00:45:36.605354 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:36.605688 kubelet[2820]: I0702 00:45:36.605663 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:36.606018 kubelet[2820]: I0702 00:45:36.605981 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4ef7c3702fc1b67258660667241dbb71-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-140\" (UID: \"4ef7c3702fc1b67258660667241dbb71\") " pod="kube-system/kube-apiserver-ip-172-31-27-140" Jul 2 00:45:36.606289 kubelet[2820]: I0702 00:45:36.606265 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:36.606584 kubelet[2820]: I0702 00:45:36.606550 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d58d9a5cd9153cf0aae48dbf2c723384-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-140\" (UID: \"d58d9a5cd9153cf0aae48dbf2c723384\") " pod="kube-system/kube-controller-manager-ip-172-31-27-140" Jul 2 00:45:36.776723 kubelet[2820]: I0702 00:45:36.776623 2820 apiserver.go:52] "Watching apiserver" Jul 2 00:45:36.792271 kubelet[2820]: I0702 00:45:36.792130 2820 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 00:45:36.942019 kubelet[2820]: I0702 00:45:36.941958 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-27-140" podStartSLOduration=0.941862317 podStartE2EDuration="941.862317ms" podCreationTimestamp="2024-07-02 00:45:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:45:36.901596766 +0000 UTC m=+1.319211484" watchObservedRunningTime="2024-07-02 00:45:36.941862317 +0000 UTC m=+1.359476999" Jul 2 00:45:36.964713 kubelet[2820]: I0702 00:45:36.964648 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-27-140" podStartSLOduration=0.964591572 podStartE2EDuration="964.591572ms" podCreationTimestamp="2024-07-02 00:45:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:45:36.94240196 +0000 UTC m=+1.360016666" watchObservedRunningTime="2024-07-02 00:45:36.964591572 +0000 UTC m=+1.382206254" Jul 2 00:45:37.014473 kubelet[2820]: I0702 00:45:37.014398 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-27-140" podStartSLOduration=1.014340342 podStartE2EDuration="1.014340342s" podCreationTimestamp="2024-07-02 00:45:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:45:36.975789722 +0000 UTC m=+1.393404404" watchObservedRunningTime="2024-07-02 00:45:37.014340342 +0000 UTC m=+1.431955024" Jul 2 00:45:40.498925 sudo[2015]: pam_unix(sudo:session): session closed for user root Jul 2 00:45:40.497000 audit[2015]: USER_END pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:45:40.497000 audit[2015]: CRED_DISP pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:45:40.513700 kernel: audit: type=1106 audit(1719881140.497:784): pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:45:40.513813 kernel: audit: type=1104 audit(1719881140.497:785): pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:45:40.529092 sshd[2012]: pam_unix(sshd:session): session closed for user core Jul 2 00:45:40.530000 audit[2012]: USER_END pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:45:40.535311 systemd-logind[1733]: Session 7 logged out. Waiting for processes to exit. Jul 2 00:45:40.537537 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 00:45:40.537817 systemd[1]: session-7.scope: Consumed 11.877s CPU time. Jul 2 00:45:40.530000 audit[2012]: CRED_DISP pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:45:40.539643 systemd-logind[1733]: Removed session 7. Jul 2 00:45:40.540909 systemd[1]: sshd@6-172.31.27.140:22-139.178.89.65:33772.service: Deactivated successfully. Jul 2 00:45:40.550656 kernel: audit: type=1106 audit(1719881140.530:786): pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:45:40.550743 kernel: audit: type=1104 audit(1719881140.530:787): pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:45:40.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.140:22-139.178.89.65:33772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:40.558481 kernel: audit: type=1131 audit(1719881140.536:788): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.140:22-139.178.89.65:33772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:45:45.178000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:45.178000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400121c120 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:45.199189 kernel: audit: type=1400 audit(1719881145.178:789): avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:45.199290 kernel: audit: type=1300 audit(1719881145.178:789): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400121c120 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:45.199367 kernel: audit: type=1327 audit(1719881145.178:789): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:45.178000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:45.178000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:45.216196 kernel: audit: type=1400 audit(1719881145.178:790): avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:45.216365 kernel: audit: type=1300 audit(1719881145.178:790): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400121c320 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:45.178000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400121c320 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:45.178000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:45.239124 kernel: audit: type=1327 audit(1719881145.178:790): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:45.184000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:45.247903 kernel: audit: type=1400 audit(1719881145.184:791): avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:45.184000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400121c4c0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:45.258194 kernel: audit: type=1300 audit(1719881145.184:791): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400121c4c0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:45.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:45.184000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:45.274757 kernel: audit: type=1327 audit(1719881145.184:791): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:45.274838 kernel: audit: type=1400 audit(1719881145.184:792): avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:45:45.184000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400121c660 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:45.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:45.679000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=8296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 00:45:45.679000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ed0600 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:45:45.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:45:47.305269 kubelet[2820]: I0702 00:45:47.305236 2820 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 00:45:47.306638 env[1742]: time="2024-07-02T00:45:47.306574454Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 00:45:47.307732 kubelet[2820]: I0702 00:45:47.307696 2820 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 00:45:48.003178 kubelet[2820]: I0702 00:45:48.003104 2820 topology_manager.go:215] "Topology Admit Handler" podUID="25e41509-3aa7-450c-88e3-6f4af09a4ca6" podNamespace="kube-system" podName="kube-proxy-zjtvl" Jul 2 00:45:48.015003 systemd[1]: Created slice kubepods-besteffort-pod25e41509_3aa7_450c_88e3_6f4af09a4ca6.slice. Jul 2 00:45:48.082175 kubelet[2820]: I0702 00:45:48.082132 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/25e41509-3aa7-450c-88e3-6f4af09a4ca6-xtables-lock\") pod \"kube-proxy-zjtvl\" (UID: \"25e41509-3aa7-450c-88e3-6f4af09a4ca6\") " pod="kube-system/kube-proxy-zjtvl" Jul 2 00:45:48.082559 kubelet[2820]: I0702 00:45:48.082492 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d88q4\" (UniqueName: \"kubernetes.io/projected/25e41509-3aa7-450c-88e3-6f4af09a4ca6-kube-api-access-d88q4\") pod \"kube-proxy-zjtvl\" (UID: \"25e41509-3aa7-450c-88e3-6f4af09a4ca6\") " pod="kube-system/kube-proxy-zjtvl" Jul 2 00:45:48.082774 kubelet[2820]: I0702 00:45:48.082752 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/25e41509-3aa7-450c-88e3-6f4af09a4ca6-kube-proxy\") pod \"kube-proxy-zjtvl\" (UID: \"25e41509-3aa7-450c-88e3-6f4af09a4ca6\") " pod="kube-system/kube-proxy-zjtvl" Jul 2 00:45:48.082941 kubelet[2820]: I0702 00:45:48.082920 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/25e41509-3aa7-450c-88e3-6f4af09a4ca6-lib-modules\") pod \"kube-proxy-zjtvl\" (UID: \"25e41509-3aa7-450c-88e3-6f4af09a4ca6\") " pod="kube-system/kube-proxy-zjtvl" Jul 2 00:45:48.328588 env[1742]: time="2024-07-02T00:45:48.328405752Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zjtvl,Uid:25e41509-3aa7-450c-88e3-6f4af09a4ca6,Namespace:kube-system,Attempt:0,}" Jul 2 00:45:48.365464 kubelet[2820]: I0702 00:45:48.365365 2820 topology_manager.go:215] "Topology Admit Handler" podUID="8472ed50-3e39-491e-a996-cf14e150a10f" podNamespace="tigera-operator" podName="tigera-operator-76c4974c85-qcfmv" Jul 2 00:45:48.384803 systemd[1]: Created slice kubepods-besteffort-pod8472ed50_3e39_491e_a996_cf14e150a10f.slice. Jul 2 00:45:48.391203 kubelet[2820]: I0702 00:45:48.390169 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8472ed50-3e39-491e-a996-cf14e150a10f-var-lib-calico\") pod \"tigera-operator-76c4974c85-qcfmv\" (UID: \"8472ed50-3e39-491e-a996-cf14e150a10f\") " pod="tigera-operator/tigera-operator-76c4974c85-qcfmv" Jul 2 00:45:48.391203 kubelet[2820]: I0702 00:45:48.390267 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9qkf\" (UniqueName: \"kubernetes.io/projected/8472ed50-3e39-491e-a996-cf14e150a10f-kube-api-access-v9qkf\") pod \"tigera-operator-76c4974c85-qcfmv\" (UID: \"8472ed50-3e39-491e-a996-cf14e150a10f\") " pod="tigera-operator/tigera-operator-76c4974c85-qcfmv" Jul 2 00:45:48.397543 env[1742]: time="2024-07-02T00:45:48.397202141Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:45:48.397543 env[1742]: time="2024-07-02T00:45:48.397285173Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:45:48.397543 env[1742]: time="2024-07-02T00:45:48.397312538Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:45:48.399623 env[1742]: time="2024-07-02T00:45:48.398023975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba89d83a9431de575ef92184ce9a6349515889dcd935501269148d515c5ca7fe pid=2906 runtime=io.containerd.runc.v2 Jul 2 00:45:48.439706 systemd[1]: Started cri-containerd-ba89d83a9431de575ef92184ce9a6349515889dcd935501269148d515c5ca7fe.scope. Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.471000 audit: BPF prog-id=103 op=LOAD Jul 2 00:45:48.473000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.473000 audit[2918]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2906 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261383964383361393433316465353735656639323138346365396136 Jul 2 00:45:48.473000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.473000 audit[2918]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2906 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261383964383361393433316465353735656639323138346365396136 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.474000 audit: BPF prog-id=104 op=LOAD Jul 2 00:45:48.474000 audit[2918]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2906 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261383964383361393433316465353735656639323138346365396136 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.475000 audit: BPF prog-id=105 op=LOAD Jul 2 00:45:48.475000 audit[2918]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2906 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261383964383361393433316465353735656639323138346365396136 Jul 2 00:45:48.477000 audit: BPF prog-id=105 op=UNLOAD Jul 2 00:45:48.477000 audit: BPF prog-id=104 op=UNLOAD Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.477000 audit: BPF prog-id=106 op=LOAD Jul 2 00:45:48.477000 audit[2918]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2906 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261383964383361393433316465353735656639323138346365396136 Jul 2 00:45:48.513478 env[1742]: time="2024-07-02T00:45:48.513366499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zjtvl,Uid:25e41509-3aa7-450c-88e3-6f4af09a4ca6,Namespace:kube-system,Attempt:0,} returns sandbox id \"ba89d83a9431de575ef92184ce9a6349515889dcd935501269148d515c5ca7fe\"" Jul 2 00:45:48.525119 env[1742]: time="2024-07-02T00:45:48.525064454Z" level=info msg="CreateContainer within sandbox \"ba89d83a9431de575ef92184ce9a6349515889dcd935501269148d515c5ca7fe\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 00:45:48.555771 env[1742]: time="2024-07-02T00:45:48.555685216Z" level=info msg="CreateContainer within sandbox \"ba89d83a9431de575ef92184ce9a6349515889dcd935501269148d515c5ca7fe\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9fa30dd58c49a78e29f524f3af28da0c57801a2b83dee9c07cb7216199ec67d8\"" Jul 2 00:45:48.558970 env[1742]: time="2024-07-02T00:45:48.557256534Z" level=info msg="StartContainer for \"9fa30dd58c49a78e29f524f3af28da0c57801a2b83dee9c07cb7216199ec67d8\"" Jul 2 00:45:48.590968 systemd[1]: Started cri-containerd-9fa30dd58c49a78e29f524f3af28da0c57801a2b83dee9c07cb7216199ec67d8.scope. Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2906 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613330646435386334396137386532396635323466336166323864 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.633000 audit: BPF prog-id=107 op=LOAD Jul 2 00:45:48.633000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2906 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613330646435386334396137386532396635323466336166323864 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.635000 audit: BPF prog-id=108 op=LOAD Jul 2 00:45:48.635000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2906 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613330646435386334396137386532396635323466336166323864 Jul 2 00:45:48.637000 audit: BPF prog-id=108 op=UNLOAD Jul 2 00:45:48.637000 audit: BPF prog-id=107 op=UNLOAD Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.637000 audit: BPF prog-id=109 op=LOAD Jul 2 00:45:48.637000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2906 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613330646435386334396137386532396635323466336166323864 Jul 2 00:45:48.669828 env[1742]: time="2024-07-02T00:45:48.669733974Z" level=info msg="StartContainer for \"9fa30dd58c49a78e29f524f3af28da0c57801a2b83dee9c07cb7216199ec67d8\" returns successfully" Jul 2 00:45:48.700194 env[1742]: time="2024-07-02T00:45:48.700134421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-qcfmv,Uid:8472ed50-3e39-491e-a996-cf14e150a10f,Namespace:tigera-operator,Attempt:0,}" Jul 2 00:45:48.729949 env[1742]: time="2024-07-02T00:45:48.729805260Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:45:48.730134 env[1742]: time="2024-07-02T00:45:48.729973784Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:45:48.730134 env[1742]: time="2024-07-02T00:45:48.730062590Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:45:48.730532 env[1742]: time="2024-07-02T00:45:48.730420138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ac67ede71f482e59c763dbd8aa8fe2f9cf8ab89eba47c27969543f4baca21b8 pid=2984 runtime=io.containerd.runc.v2 Jul 2 00:45:48.775149 systemd[1]: Started cri-containerd-6ac67ede71f482e59c763dbd8aa8fe2f9cf8ab89eba47c27969543f4baca21b8.scope. Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.811000 audit: BPF prog-id=110 op=LOAD Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2984 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661633637656465373166343832653539633736336462643861613866 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2984 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661633637656465373166343832653539633736336462643861613866 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.813000 audit: BPF prog-id=111 op=LOAD Jul 2 00:45:48.813000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2984 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661633637656465373166343832653539633736336462643861613866 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.815000 audit: BPF prog-id=112 op=LOAD Jul 2 00:45:48.815000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2984 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661633637656465373166343832653539633736336462643861613866 Jul 2 00:45:48.816000 audit: BPF prog-id=112 op=UNLOAD Jul 2 00:45:48.816000 audit: BPF prog-id=111 op=UNLOAD Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:48.816000 audit: BPF prog-id=113 op=LOAD Jul 2 00:45:48.816000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2984 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661633637656465373166343832653539633736336462643861613866 Jul 2 00:45:48.848000 audit[3038]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=3038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:48.848000 audit[3038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6c12c00 a2=0 a3=1 items=0 ppid=2962 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 00:45:48.859000 audit[3039]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.859000 audit[3039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb13bef0 a2=0 a3=1 items=0 ppid=2962 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 00:45:48.874000 audit[3041]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3041 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.874000 audit[3041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf2b8d20 a2=0 a3=1 items=0 ppid=2962 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 00:45:48.884000 audit[3042]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=3042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:48.884000 audit[3042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2f79170 a2=0 a3=1 items=0 ppid=2962 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 00:45:48.888000 audit[3046]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.888000 audit[3046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd505470 a2=0 a3=1 items=0 ppid=2962 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 00:45:48.890169 env[1742]: time="2024-07-02T00:45:48.889631741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-qcfmv,Uid:8472ed50-3e39-491e-a996-cf14e150a10f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6ac67ede71f482e59c763dbd8aa8fe2f9cf8ab89eba47c27969543f4baca21b8\"" Jul 2 00:45:48.893490 env[1742]: time="2024-07-02T00:45:48.893402687Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 00:45:48.893000 audit[3049]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:48.893000 audit[3049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffda639850 a2=0 a3=1 items=0 ppid=2962 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 00:45:48.970000 audit[3050]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3050 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.970000 audit[3050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffda037f50 a2=0 a3=1 items=0 ppid=2962 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:45:48.976000 audit[3052]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.976000 audit[3052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffeecc3490 a2=0 a3=1 items=0 ppid=2962 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 00:45:48.983000 audit[3055]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.983000 audit[3055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffb6a3bb0 a2=0 a3=1 items=0 ppid=2962 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 00:45:48.985000 audit[3056]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.985000 audit[3056]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe751eb30 a2=0 a3=1 items=0 ppid=2962 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 00:45:48.991000 audit[3058]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.991000 audit[3058]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff4e53a30 a2=0 a3=1 items=0 ppid=2962 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 00:45:48.994000 audit[3059]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3059 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:48.994000 audit[3059]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0c585c0 a2=0 a3=1 items=0 ppid=2962 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:48.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 00:45:49.005000 audit[3061]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.005000 audit[3061]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd66ec610 a2=0 a3=1 items=0 ppid=2962 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 00:45:49.024000 audit[3064]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.024000 audit[3064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcba60600 a2=0 a3=1 items=0 ppid=2962 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 00:45:49.027000 audit[3065]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.027000 audit[3065]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2c5f180 a2=0 a3=1 items=0 ppid=2962 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 00:45:49.034000 audit[3067]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3067 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.034000 audit[3067]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc7737860 a2=0 a3=1 items=0 ppid=2962 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 00:45:49.036000 audit[3068]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.036000 audit[3068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcad27bc0 a2=0 a3=1 items=0 ppid=2962 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 00:45:49.042000 audit[3070]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.042000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff24ebc30 a2=0 a3=1 items=0 ppid=2962 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:45:49.051000 audit[3073]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.051000 audit[3073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd5ff6470 a2=0 a3=1 items=0 ppid=2962 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:45:49.064000 audit[3076]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.064000 audit[3076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe0f1c4d0 a2=0 a3=1 items=0 ppid=2962 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 00:45:49.069000 audit[3077]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.069000 audit[3077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc7316300 a2=0 a3=1 items=0 ppid=2962 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 00:45:49.075000 audit[3079]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.075000 audit[3079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd9294d80 a2=0 a3=1 items=0 ppid=2962 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:45:49.082000 audit[3082]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.082000 audit[3082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd523aba0 a2=0 a3=1 items=0 ppid=2962 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:45:49.084000 audit[3083]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.084000 audit[3083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdec93180 a2=0 a3=1 items=0 ppid=2962 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 00:45:49.090000 audit[3085]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:45:49.090000 audit[3085]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff8f1dff0 a2=0 a3=1 items=0 ppid=2962 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 00:45:49.128000 audit[3091]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:45:49.128000 audit[3091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffcf66d390 a2=0 a3=1 items=0 ppid=2962 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:49.141000 audit[3091]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:45:49.141000 audit[3091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffcf66d390 a2=0 a3=1 items=0 ppid=2962 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:49.144000 audit[3097]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3097 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.144000 audit[3097]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcd740b50 a2=0 a3=1 items=0 ppid=2962 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:45:49.150000 audit[3099]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.150000 audit[3099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd1b2e360 a2=0 a3=1 items=0 ppid=2962 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 00:45:49.158000 audit[3102]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3102 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.158000 audit[3102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd79b03c0 a2=0 a3=1 items=0 ppid=2962 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 00:45:49.160000 audit[3103]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.160000 audit[3103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa2db110 a2=0 a3=1 items=0 ppid=2962 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 00:45:49.165000 audit[3105]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3105 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.165000 audit[3105]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffebdf1060 a2=0 a3=1 items=0 ppid=2962 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 00:45:49.167000 audit[3106]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.167000 audit[3106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce9cf3a0 a2=0 a3=1 items=0 ppid=2962 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 00:45:49.176000 audit[3108]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3108 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.176000 audit[3108]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffe784ee0 a2=0 a3=1 items=0 ppid=2962 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 00:45:49.184000 audit[3111]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.184000 audit[3111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe40b9930 a2=0 a3=1 items=0 ppid=2962 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 00:45:49.186000 audit[3112]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.186000 audit[3112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5192b10 a2=0 a3=1 items=0 ppid=2962 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 00:45:49.192000 audit[3114]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.192000 audit[3114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd10df850 a2=0 a3=1 items=0 ppid=2962 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 00:45:49.195000 audit[3115]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.195000 audit[3115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdba52090 a2=0 a3=1 items=0 ppid=2962 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 00:45:49.215000 audit[3117]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3117 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.215000 audit[3117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe34937f0 a2=0 a3=1 items=0 ppid=2962 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:45:49.222000 audit[3120]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3120 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.222000 audit[3120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7364460 a2=0 a3=1 items=0 ppid=2962 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 00:45:49.230000 audit[3123]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3123 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.230000 audit[3123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed451650 a2=0 a3=1 items=0 ppid=2962 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 00:45:49.232000 audit[3124]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.232000 audit[3124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc8cf3be0 a2=0 a3=1 items=0 ppid=2962 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 00:45:49.237000 audit[3126]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.237000 audit[3126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff822edf0 a2=0 a3=1 items=0 ppid=2962 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:45:49.245000 audit[3129]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.245000 audit[3129]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdab1b5d0 a2=0 a3=1 items=0 ppid=2962 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:45:49.248000 audit[3130]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.248000 audit[3130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3632a30 a2=0 a3=1 items=0 ppid=2962 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 00:45:49.252000 audit[3132]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.252000 audit[3132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe2571500 a2=0 a3=1 items=0 ppid=2962 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 00:45:49.255000 audit[3133]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.255000 audit[3133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9ccaf90 a2=0 a3=1 items=0 ppid=2962 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 00:45:49.259000 audit[3135]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.259000 audit[3135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffde981f00 a2=0 a3=1 items=0 ppid=2962 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:45:49.271000 audit[3138]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:45:49.271000 audit[3138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffec9d6120 a2=0 a3=1 items=0 ppid=2962 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:45:49.279000 audit[3140]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 00:45:49.279000 audit[3140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffcb40a450 a2=0 a3=1 items=0 ppid=2962 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.279000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:49.280000 audit[3140]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 00:45:49.280000 audit[3140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffcb40a450 a2=0 a3=1 items=0 ppid=2962 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:49.280000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:50.120752 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount563396075.mount: Deactivated successfully. Jul 2 00:45:51.182965 env[1742]: time="2024-07-02T00:45:51.182906160Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:51.187147 env[1742]: time="2024-07-02T00:45:51.187097254Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:51.190414 env[1742]: time="2024-07-02T00:45:51.190330002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:51.194410 env[1742]: time="2024-07-02T00:45:51.194342001Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:51.194980 env[1742]: time="2024-07-02T00:45:51.194933081Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92\"" Jul 2 00:45:51.200986 env[1742]: time="2024-07-02T00:45:51.200921182Z" level=info msg="CreateContainer within sandbox \"6ac67ede71f482e59c763dbd8aa8fe2f9cf8ab89eba47c27969543f4baca21b8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 00:45:51.231293 env[1742]: time="2024-07-02T00:45:51.231230952Z" level=info msg="CreateContainer within sandbox \"6ac67ede71f482e59c763dbd8aa8fe2f9cf8ab89eba47c27969543f4baca21b8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02\"" Jul 2 00:45:51.234282 env[1742]: time="2024-07-02T00:45:51.232429412Z" level=info msg="StartContainer for \"3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02\"" Jul 2 00:45:51.268942 systemd[1]: Started cri-containerd-3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02.scope. Jul 2 00:45:51.314259 kernel: kauditd_printk_skb: 315 callbacks suppressed Jul 2 00:45:51.314402 kernel: audit: type=1400 audit(1719881151.311:887): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.328181 kernel: audit: type=1400 audit(1719881151.311:888): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.328420 kernel: audit: type=1400 audit(1719881151.311:889): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.344691 kernel: audit: type=1400 audit(1719881151.311:890): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.352351 kernel: audit: type=1400 audit(1719881151.311:891): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.360497 kernel: audit: type=1400 audit(1719881151.311:892): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.370754 kernel: audit: type=1400 audit(1719881151.311:893): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.378648 kernel: audit: type=1400 audit(1719881151.311:894): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.385283 kernel: audit: type=1400 audit(1719881151.311:895): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.392068 kernel: audit: type=1400 audit(1719881151.313:896): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.313000 audit: BPF prog-id=114 op=LOAD Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2984 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:51.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333766333363336266353834343862313233663137616638666165 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2984 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:51.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333766333363336266353834343862313233663137616638666165 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit: BPF prog-id=115 op=LOAD Jul 2 00:45:51.320000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2984 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:51.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333766333363336266353834343862313233663137616638666165 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit: BPF prog-id=116 op=LOAD Jul 2 00:45:51.320000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2984 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:51.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333766333363336266353834343862313233663137616638666165 Jul 2 00:45:51.320000 audit: BPF prog-id=116 op=UNLOAD Jul 2 00:45:51.320000 audit: BPF prog-id=115 op=UNLOAD Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:51.320000 audit: BPF prog-id=117 op=LOAD Jul 2 00:45:51.320000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2984 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:51.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333766333363336266353834343862313233663137616638666165 Jul 2 00:45:51.407053 env[1742]: time="2024-07-02T00:45:51.406908083Z" level=info msg="StartContainer for \"3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02\" returns successfully" Jul 2 00:45:52.022184 kubelet[2820]: I0702 00:45:52.022139 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-zjtvl" podStartSLOduration=5.022058081 podStartE2EDuration="5.022058081s" podCreationTimestamp="2024-07-02 00:45:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:45:49.019015479 +0000 UTC m=+13.436630185" watchObservedRunningTime="2024-07-02 00:45:52.022058081 +0000 UTC m=+16.439672751" Jul 2 00:45:55.789000 audit[3178]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3178 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:45:55.789000 audit[3178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd468cc30 a2=0 a3=1 items=0 ppid=2962 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:55.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:55.792000 audit[3178]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3178 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:45:55.792000 audit[3178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd468cc30 a2=0 a3=1 items=0 ppid=2962 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:55.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:55.808000 audit[3180]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3180 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:45:55.808000 audit[3180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd5c0e680 a2=0 a3=1 items=0 ppid=2962 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:55.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:55.810000 audit[3180]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3180 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:45:55.810000 audit[3180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd5c0e680 a2=0 a3=1 items=0 ppid=2962 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:55.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:55.966066 kubelet[2820]: I0702 00:45:55.966021 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4974c85-qcfmv" podStartSLOduration=5.661603509 podStartE2EDuration="7.96588349s" podCreationTimestamp="2024-07-02 00:45:48 +0000 UTC" firstStartedPulling="2024-07-02 00:45:48.892145841 +0000 UTC m=+13.309760499" lastFinishedPulling="2024-07-02 00:45:51.19642581 +0000 UTC m=+15.614040480" observedRunningTime="2024-07-02 00:45:52.024834448 +0000 UTC m=+16.442449142" watchObservedRunningTime="2024-07-02 00:45:55.96588349 +0000 UTC m=+20.383498172" Jul 2 00:45:55.967483 kubelet[2820]: I0702 00:45:55.967412 2820 topology_manager.go:215] "Topology Admit Handler" podUID="dbc52abb-c88a-47bb-8c31-386e14cf54cc" podNamespace="calico-system" podName="calico-typha-64bcc96bdb-htpgv" Jul 2 00:45:55.978779 systemd[1]: Created slice kubepods-besteffort-poddbc52abb_c88a_47bb_8c31_386e14cf54cc.slice. Jul 2 00:45:56.038901 kubelet[2820]: I0702 00:45:56.038845 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ccd2p\" (UniqueName: \"kubernetes.io/projected/dbc52abb-c88a-47bb-8c31-386e14cf54cc-kube-api-access-ccd2p\") pod \"calico-typha-64bcc96bdb-htpgv\" (UID: \"dbc52abb-c88a-47bb-8c31-386e14cf54cc\") " pod="calico-system/calico-typha-64bcc96bdb-htpgv" Jul 2 00:45:56.039074 kubelet[2820]: I0702 00:45:56.038932 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/dbc52abb-c88a-47bb-8c31-386e14cf54cc-typha-certs\") pod \"calico-typha-64bcc96bdb-htpgv\" (UID: \"dbc52abb-c88a-47bb-8c31-386e14cf54cc\") " pod="calico-system/calico-typha-64bcc96bdb-htpgv" Jul 2 00:45:56.039074 kubelet[2820]: I0702 00:45:56.038984 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dbc52abb-c88a-47bb-8c31-386e14cf54cc-tigera-ca-bundle\") pod \"calico-typha-64bcc96bdb-htpgv\" (UID: \"dbc52abb-c88a-47bb-8c31-386e14cf54cc\") " pod="calico-system/calico-typha-64bcc96bdb-htpgv" Jul 2 00:45:56.242576 kubelet[2820]: I0702 00:45:56.242517 2820 topology_manager.go:215] "Topology Admit Handler" podUID="9e4a5529-4593-401b-abd2-2c97ec8711db" podNamespace="calico-system" podName="calico-node-c2jtw" Jul 2 00:45:56.254104 systemd[1]: Created slice kubepods-besteffort-pod9e4a5529_4593_401b_abd2_2c97ec8711db.slice. Jul 2 00:45:56.290634 env[1742]: time="2024-07-02T00:45:56.290564297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64bcc96bdb-htpgv,Uid:dbc52abb-c88a-47bb-8c31-386e14cf54cc,Namespace:calico-system,Attempt:0,}" Jul 2 00:45:56.340698 env[1742]: time="2024-07-02T00:45:56.340567202Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:45:56.340993 env[1742]: time="2024-07-02T00:45:56.340932348Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:45:56.341185 env[1742]: time="2024-07-02T00:45:56.341127846Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:45:56.341739 env[1742]: time="2024-07-02T00:45:56.341644467Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5e8c0befc5af64741b2729d6e8630041e50d389a377759df9752cf467d84074 pid=3191 runtime=io.containerd.runc.v2 Jul 2 00:45:56.341955 kubelet[2820]: I0702 00:45:56.341901 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9e4a5529-4593-401b-abd2-2c97ec8711db-tigera-ca-bundle\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.342048 kubelet[2820]: I0702 00:45:56.341997 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-cni-net-dir\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.342119 kubelet[2820]: I0702 00:45:56.342073 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-xtables-lock\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.342183 kubelet[2820]: I0702 00:45:56.342143 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-flexvol-driver-host\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.342257 kubelet[2820]: I0702 00:45:56.342195 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-lib-modules\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.342330 kubelet[2820]: I0702 00:45:56.342276 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-var-run-calico\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.342393 kubelet[2820]: I0702 00:45:56.342349 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-policysync\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.342485 kubelet[2820]: I0702 00:45:56.342426 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-var-lib-calico\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.344692 kubelet[2820]: I0702 00:45:56.344591 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4rvff\" (UniqueName: \"kubernetes.io/projected/9e4a5529-4593-401b-abd2-2c97ec8711db-kube-api-access-4rvff\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.344860 kubelet[2820]: I0702 00:45:56.344706 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9e4a5529-4593-401b-abd2-2c97ec8711db-node-certs\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.344860 kubelet[2820]: I0702 00:45:56.344782 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-cni-bin-dir\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.344860 kubelet[2820]: I0702 00:45:56.344852 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9e4a5529-4593-401b-abd2-2c97ec8711db-cni-log-dir\") pod \"calico-node-c2jtw\" (UID: \"9e4a5529-4593-401b-abd2-2c97ec8711db\") " pod="calico-system/calico-node-c2jtw" Jul 2 00:45:56.382704 systemd[1]: Started cri-containerd-e5e8c0befc5af64741b2729d6e8630041e50d389a377759df9752cf467d84074.scope. Jul 2 00:45:56.421793 kubelet[2820]: I0702 00:45:56.420924 2820 topology_manager.go:215] "Topology Admit Handler" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" podNamespace="calico-system" podName="csi-node-driver-7wf2w" Jul 2 00:45:56.421793 kubelet[2820]: E0702 00:45:56.421322 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:45:56.448476 kubelet[2820]: I0702 00:45:56.445643 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7-kubelet-dir\") pod \"csi-node-driver-7wf2w\" (UID: \"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7\") " pod="calico-system/csi-node-driver-7wf2w" Jul 2 00:45:56.448476 kubelet[2820]: I0702 00:45:56.445750 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7-socket-dir\") pod \"csi-node-driver-7wf2w\" (UID: \"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7\") " pod="calico-system/csi-node-driver-7wf2w" Jul 2 00:45:56.448476 kubelet[2820]: I0702 00:45:56.445847 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7-varrun\") pod \"csi-node-driver-7wf2w\" (UID: \"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7\") " pod="calico-system/csi-node-driver-7wf2w" Jul 2 00:45:56.448476 kubelet[2820]: I0702 00:45:56.445920 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-njnrg\" (UniqueName: \"kubernetes.io/projected/14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7-kube-api-access-njnrg\") pod \"csi-node-driver-7wf2w\" (UID: \"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7\") " pod="calico-system/csi-node-driver-7wf2w" Jul 2 00:45:56.448476 kubelet[2820]: I0702 00:45:56.446091 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7-registration-dir\") pod \"csi-node-driver-7wf2w\" (UID: \"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7\") " pod="calico-system/csi-node-driver-7wf2w" Jul 2 00:45:56.450882 kubelet[2820]: E0702 00:45:56.450837 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.451124 kubelet[2820]: W0702 00:45:56.451076 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.451307 kubelet[2820]: E0702 00:45:56.451280 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.460810 kubelet[2820]: E0702 00:45:56.460770 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.461121 kubelet[2820]: W0702 00:45:56.461088 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.461296 kubelet[2820]: E0702 00:45:56.461269 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.480790 kubelet[2820]: E0702 00:45:56.480605 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.480790 kubelet[2820]: W0702 00:45:56.480639 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.480790 kubelet[2820]: E0702 00:45:56.480730 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.499188 kernel: kauditd_printk_skb: 59 callbacks suppressed Jul 2 00:45:56.499340 kernel: audit: type=1400 audit(1719881156.495:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.514240 kernel: audit: type=1400 audit(1719881156.495:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.526074 kernel: audit: type=1400 audit(1719881156.495:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.535352 kernel: audit: type=1400 audit(1719881156.495:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.546787 kernel: audit: type=1400 audit(1719881156.495:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.548370 kubelet[2820]: E0702 00:45:56.548334 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.548890 kubelet[2820]: W0702 00:45:56.548601 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.548890 kubelet[2820]: E0702 00:45:56.548650 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.549923 kubelet[2820]: E0702 00:45:56.549891 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.550200 kubelet[2820]: W0702 00:45:56.550158 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.550380 kubelet[2820]: E0702 00:45:56.550355 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.551228 kubelet[2820]: E0702 00:45:56.551193 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.551482 kubelet[2820]: W0702 00:45:56.551432 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.552053 kubelet[2820]: E0702 00:45:56.552029 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.552573 kubelet[2820]: E0702 00:45:56.552552 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.552706 kubelet[2820]: W0702 00:45:56.552683 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.553003 kubelet[2820]: E0702 00:45:56.552982 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.554354 kubelet[2820]: E0702 00:45:56.554324 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.554671 kubelet[2820]: W0702 00:45:56.554644 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.555003 kubelet[2820]: E0702 00:45:56.554981 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.555477 kubelet[2820]: E0702 00:45:56.555457 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.555610 kubelet[2820]: W0702 00:45:56.555586 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.555869 kubelet[2820]: E0702 00:45:56.555849 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.556249 kubelet[2820]: E0702 00:45:56.556229 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.556379 kubelet[2820]: W0702 00:45:56.556355 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.556644 kubelet[2820]: E0702 00:45:56.556625 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.557005 kubelet[2820]: E0702 00:45:56.556984 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.557132 kubelet[2820]: W0702 00:45:56.557109 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.557406 kubelet[2820]: E0702 00:45:56.557386 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.557759 kernel: audit: type=1400 audit(1719881156.495:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.557827 kernel: audit: type=1400 audit(1719881156.495:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.558116 kubelet[2820]: E0702 00:45:56.558095 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.558236 kubelet[2820]: W0702 00:45:56.558212 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.558503 kubelet[2820]: E0702 00:45:56.558482 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.558850 kubelet[2820]: E0702 00:45:56.558830 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.558982 kubelet[2820]: W0702 00:45:56.558959 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.559217 kubelet[2820]: E0702 00:45:56.559199 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.562418 kubelet[2820]: E0702 00:45:56.562389 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.562717 kubelet[2820]: W0702 00:45:56.562689 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.563004 kubelet[2820]: E0702 00:45:56.562981 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.563407 kubelet[2820]: E0702 00:45:56.563377 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.563545 kubelet[2820]: W0702 00:45:56.563522 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.563806 kubelet[2820]: E0702 00:45:56.563770 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.564419 env[1742]: time="2024-07-02T00:45:56.564358496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c2jtw,Uid:9e4a5529-4593-401b-abd2-2c97ec8711db,Namespace:calico-system,Attempt:0,}" Jul 2 00:45:56.565688 kubelet[2820]: E0702 00:45:56.565626 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.565865 kubelet[2820]: W0702 00:45:56.565834 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.566143 kubelet[2820]: E0702 00:45:56.566117 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.566970 kubelet[2820]: E0702 00:45:56.566936 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.567196 kubelet[2820]: W0702 00:45:56.567166 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.568719 kubelet[2820]: E0702 00:45:56.567417 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.569821 kubelet[2820]: E0702 00:45:56.569758 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.570054 kubelet[2820]: W0702 00:45:56.570024 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.570411 kubelet[2820]: E0702 00:45:56.570383 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.571713 kubelet[2820]: E0702 00:45:56.571677 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.571930 kubelet[2820]: W0702 00:45:56.571899 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.572168 kubelet[2820]: E0702 00:45:56.572145 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.572800 kubelet[2820]: E0702 00:45:56.572771 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.572997 kubelet[2820]: W0702 00:45:56.572970 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.573398 kubelet[2820]: E0702 00:45:56.573371 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.573880 kubelet[2820]: E0702 00:45:56.573850 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.574109 kubelet[2820]: W0702 00:45:56.574079 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.574595 kubelet[2820]: E0702 00:45:56.574521 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.584232 kernel: audit: type=1400 audit(1719881156.495:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.584489 kubelet[2820]: E0702 00:45:56.575224 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.584489 kubelet[2820]: W0702 00:45:56.575251 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.584489 kubelet[2820]: E0702 00:45:56.575933 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.584489 kubelet[2820]: E0702 00:45:56.576256 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.584489 kubelet[2820]: W0702 00:45:56.576276 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.584489 kubelet[2820]: E0702 00:45:56.576518 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.584489 kubelet[2820]: E0702 00:45:56.579090 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.584489 kubelet[2820]: W0702 00:45:56.579119 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.584489 kubelet[2820]: E0702 00:45:56.579355 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.585347 kubelet[2820]: E0702 00:45:56.585314 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.585540 kubelet[2820]: W0702 00:45:56.585501 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.585835 kubelet[2820]: E0702 00:45:56.585810 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.586666 kubelet[2820]: E0702 00:45:56.586632 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.587051 kubelet[2820]: W0702 00:45:56.587020 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.587288 kubelet[2820]: E0702 00:45:56.587264 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.588056 kubelet[2820]: E0702 00:45:56.588032 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.588206 kubelet[2820]: W0702 00:45:56.588181 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.588362 kubelet[2820]: E0702 00:45:56.588332 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.589577 kubelet[2820]: E0702 00:45:56.589522 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.589750 kubelet[2820]: W0702 00:45:56.589725 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.589893 kubelet[2820]: E0702 00:45:56.589871 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.593449 kernel: audit: type=1400 audit(1719881156.495:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.608884 kernel: audit: type=1400 audit(1719881156.497:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.497000 audit: BPF prog-id=118 op=LOAD Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3191 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653863306265666335616636343734316232373239643665383633 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3191 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653863306265666335616636343734316232373239643665383633 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit: BPF prog-id=119 op=LOAD Jul 2 00:45:56.504000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3191 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653863306265666335616636343734316232373239643665383633 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit: BPF prog-id=120 op=LOAD Jul 2 00:45:56.504000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3191 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653863306265666335616636343734316232373239643665383633 Jul 2 00:45:56.504000 audit: BPF prog-id=120 op=UNLOAD Jul 2 00:45:56.504000 audit: BPF prog-id=119 op=UNLOAD Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.504000 audit: BPF prog-id=121 op=LOAD Jul 2 00:45:56.504000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3191 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653863306265666335616636343734316232373239643665383633 Jul 2 00:45:56.618602 env[1742]: time="2024-07-02T00:45:56.617470550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:45:56.618602 env[1742]: time="2024-07-02T00:45:56.617546389Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:45:56.618602 env[1742]: time="2024-07-02T00:45:56.617571785Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:45:56.621247 env[1742]: time="2024-07-02T00:45:56.619290480Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35 pid=3254 runtime=io.containerd.runc.v2 Jul 2 00:45:56.659431 systemd[1]: Started cri-containerd-500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35.scope. Jul 2 00:45:56.666672 kubelet[2820]: E0702 00:45:56.666633 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.666890 kubelet[2820]: W0702 00:45:56.666858 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.667087 kubelet[2820]: E0702 00:45:56.667063 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.680677 kubelet[2820]: E0702 00:45:56.680643 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:45:56.680929 kubelet[2820]: W0702 00:45:56.680901 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:45:56.681088 kubelet[2820]: E0702 00:45:56.681064 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:45:56.704263 env[1742]: time="2024-07-02T00:45:56.704165104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64bcc96bdb-htpgv,Uid:dbc52abb-c88a-47bb-8c31-386e14cf54cc,Namespace:calico-system,Attempt:0,} returns sandbox id \"e5e8c0befc5af64741b2729d6e8630041e50d389a377759df9752cf467d84074\"" Jul 2 00:45:56.711236 env[1742]: time="2024-07-02T00:45:56.711167725Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit: BPF prog-id=122 op=LOAD Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3254 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306663643437353865636366393666303939333835303463386464 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3254 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306663643437353865636366393666303939333835303463386464 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.777000 audit: BPF prog-id=123 op=LOAD Jul 2 00:45:56.777000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3254 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306663643437353865636366393666303939333835303463386464 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit: BPF prog-id=124 op=LOAD Jul 2 00:45:56.778000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3254 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306663643437353865636366393666303939333835303463386464 Jul 2 00:45:56.778000 audit: BPF prog-id=124 op=UNLOAD Jul 2 00:45:56.778000 audit: BPF prog-id=123 op=UNLOAD Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:56.778000 audit: BPF prog-id=125 op=LOAD Jul 2 00:45:56.778000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3254 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530306663643437353865636366393666303939333835303463386464 Jul 2 00:45:56.811250 env[1742]: time="2024-07-02T00:45:56.811193374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c2jtw,Uid:9e4a5529-4593-401b-abd2-2c97ec8711db,Namespace:calico-system,Attempt:0,} returns sandbox id \"500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35\"" Jul 2 00:45:56.843000 audit[3300]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:45:56.843000 audit[3300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc1def960 a2=0 a3=1 items=0 ppid=2962 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.843000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:56.845000 audit[3300]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:45:56.845000 audit[3300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc1def960 a2=0 a3=1 items=0 ppid=2962 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:56.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:45:57.159908 systemd[1]: run-containerd-runc-k8s.io-e5e8c0befc5af64741b2729d6e8630041e50d389a377759df9752cf467d84074-runc.OlXLyw.mount: Deactivated successfully. Jul 2 00:45:57.827616 kubelet[2820]: E0702 00:45:57.827575 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:45:58.951138 env[1742]: time="2024-07-02T00:45:58.951065511Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:58.955947 env[1742]: time="2024-07-02T00:45:58.955865635Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:58.960501 env[1742]: time="2024-07-02T00:45:58.960384556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:58.965081 env[1742]: time="2024-07-02T00:45:58.965005421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:45:58.967845 env[1742]: time="2024-07-02T00:45:58.966557735Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03\"" Jul 2 00:45:58.970173 env[1742]: time="2024-07-02T00:45:58.970104786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 00:45:59.008505 env[1742]: time="2024-07-02T00:45:59.007150562Z" level=info msg="CreateContainer within sandbox \"e5e8c0befc5af64741b2729d6e8630041e50d389a377759df9752cf467d84074\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 00:45:59.035763 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1333400754.mount: Deactivated successfully. Jul 2 00:45:59.045631 env[1742]: time="2024-07-02T00:45:59.045550350Z" level=info msg="CreateContainer within sandbox \"e5e8c0befc5af64741b2729d6e8630041e50d389a377759df9752cf467d84074\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e87fee75051db8d680c2836dc1b19d1c51dc52a53f2301d5f52f3b4391ee8fde\"" Jul 2 00:45:59.046681 env[1742]: time="2024-07-02T00:45:59.046611427Z" level=info msg="StartContainer for \"e87fee75051db8d680c2836dc1b19d1c51dc52a53f2301d5f52f3b4391ee8fde\"" Jul 2 00:45:59.092665 systemd[1]: Started cri-containerd-e87fee75051db8d680c2836dc1b19d1c51dc52a53f2301d5f52f3b4391ee8fde.scope. Jul 2 00:45:59.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.147000 audit: BPF prog-id=126 op=LOAD Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3191 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:59.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376665653735303531646238643638306332383336646331623139 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3191 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:59.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376665653735303531646238643638306332383336646331623139 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit: BPF prog-id=127 op=LOAD Jul 2 00:45:59.149000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3191 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:59.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376665653735303531646238643638306332383336646331623139 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit: BPF prog-id=128 op=LOAD Jul 2 00:45:59.149000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3191 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:59.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376665653735303531646238643638306332383336646331623139 Jul 2 00:45:59.149000 audit: BPF prog-id=128 op=UNLOAD Jul 2 00:45:59.149000 audit: BPF prog-id=127 op=UNLOAD Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:45:59.149000 audit: BPF prog-id=129 op=LOAD Jul 2 00:45:59.149000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3191 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:45:59.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376665653735303531646238643638306332383336646331623139 Jul 2 00:45:59.202877 env[1742]: time="2024-07-02T00:45:59.202739872Z" level=info msg="StartContainer for \"e87fee75051db8d680c2836dc1b19d1c51dc52a53f2301d5f52f3b4391ee8fde\" returns successfully" Jul 2 00:45:59.826660 kubelet[2820]: E0702 00:45:59.824994 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:46:00.065871 kubelet[2820]: E0702 00:46:00.065832 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.066127 kubelet[2820]: W0702 00:46:00.066098 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.066276 kubelet[2820]: E0702 00:46:00.066253 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.067646 kubelet[2820]: E0702 00:46:00.067598 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.067839 kubelet[2820]: W0702 00:46:00.067811 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.068003 kubelet[2820]: E0702 00:46:00.067981 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.069664 kubelet[2820]: E0702 00:46:00.069626 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.069881 kubelet[2820]: W0702 00:46:00.069854 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.070008 kubelet[2820]: E0702 00:46:00.069985 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.070502 kubelet[2820]: E0702 00:46:00.070477 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.070636 kubelet[2820]: W0702 00:46:00.070612 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.070754 kubelet[2820]: E0702 00:46:00.070732 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.071624 kubelet[2820]: E0702 00:46:00.071587 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.071841 kubelet[2820]: W0702 00:46:00.071814 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.071963 kubelet[2820]: E0702 00:46:00.071941 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.074643 kubelet[2820]: E0702 00:46:00.074604 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.074838 kubelet[2820]: W0702 00:46:00.074811 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.074993 kubelet[2820]: E0702 00:46:00.074970 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.075685 kubelet[2820]: E0702 00:46:00.075654 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.075874 kubelet[2820]: W0702 00:46:00.075847 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.076000 kubelet[2820]: E0702 00:46:00.075978 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.077742 kubelet[2820]: E0702 00:46:00.077618 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.077946 kubelet[2820]: W0702 00:46:00.077916 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.078086 kubelet[2820]: E0702 00:46:00.078063 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.081643 kubelet[2820]: E0702 00:46:00.081601 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.081874 kubelet[2820]: W0702 00:46:00.081847 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.082001 kubelet[2820]: E0702 00:46:00.081978 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.083856 kubelet[2820]: E0702 00:46:00.083822 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.084053 kubelet[2820]: W0702 00:46:00.084026 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.084178 kubelet[2820]: E0702 00:46:00.084156 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.086898 kubelet[2820]: E0702 00:46:00.086862 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.087127 kubelet[2820]: W0702 00:46:00.087101 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.087253 kubelet[2820]: E0702 00:46:00.087231 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.096945 kubelet[2820]: E0702 00:46:00.096913 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.097139 kubelet[2820]: W0702 00:46:00.097111 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.097292 kubelet[2820]: E0702 00:46:00.097269 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.102628 kubelet[2820]: E0702 00:46:00.102588 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.102831 kubelet[2820]: W0702 00:46:00.102803 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.102955 kubelet[2820]: E0702 00:46:00.102933 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.104647 kubelet[2820]: E0702 00:46:00.104608 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.104874 kubelet[2820]: W0702 00:46:00.104846 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.105013 kubelet[2820]: E0702 00:46:00.104991 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.107145 kubelet[2820]: I0702 00:46:00.107098 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-64bcc96bdb-htpgv" podStartSLOduration=2.84841174 podStartE2EDuration="5.10704202s" podCreationTimestamp="2024-07-02 00:45:55 +0000 UTC" firstStartedPulling="2024-07-02 00:45:56.709760348 +0000 UTC m=+21.127375018" lastFinishedPulling="2024-07-02 00:45:58.968390616 +0000 UTC m=+23.386005298" observedRunningTime="2024-07-02 00:46:00.086746988 +0000 UTC m=+24.504361682" watchObservedRunningTime="2024-07-02 00:46:00.10704202 +0000 UTC m=+24.524656702" Jul 2 00:46:00.107901 kubelet[2820]: E0702 00:46:00.107875 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.108073 kubelet[2820]: W0702 00:46:00.108047 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.108198 kubelet[2820]: E0702 00:46:00.108174 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.109157 kubelet[2820]: E0702 00:46:00.109122 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.109626 kubelet[2820]: W0702 00:46:00.109592 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.114594 kubelet[2820]: E0702 00:46:00.114550 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.116673 kubelet[2820]: E0702 00:46:00.116636 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.116869 kubelet[2820]: W0702 00:46:00.116843 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.117043 kubelet[2820]: E0702 00:46:00.117018 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.117854 kubelet[2820]: E0702 00:46:00.117773 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.117854 kubelet[2820]: W0702 00:46:00.117811 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.118088 kubelet[2820]: E0702 00:46:00.117862 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.118491 kubelet[2820]: E0702 00:46:00.118201 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.118491 kubelet[2820]: W0702 00:46:00.118229 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.118491 kubelet[2820]: E0702 00:46:00.118270 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.118735 kubelet[2820]: E0702 00:46:00.118626 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.118735 kubelet[2820]: W0702 00:46:00.118645 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.118735 kubelet[2820]: E0702 00:46:00.118673 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.120507 kubelet[2820]: E0702 00:46:00.119005 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.120507 kubelet[2820]: W0702 00:46:00.119034 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.120507 kubelet[2820]: E0702 00:46:00.119317 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.120507 kubelet[2820]: W0702 00:46:00.119334 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.120507 kubelet[2820]: E0702 00:46:00.119645 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.120507 kubelet[2820]: W0702 00:46:00.119663 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.120507 kubelet[2820]: E0702 00:46:00.119690 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.120507 kubelet[2820]: E0702 00:46:00.120135 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.120507 kubelet[2820]: W0702 00:46:00.120155 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.120507 kubelet[2820]: E0702 00:46:00.120181 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.121322 kubelet[2820]: E0702 00:46:00.120595 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.121322 kubelet[2820]: W0702 00:46:00.120616 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.121322 kubelet[2820]: E0702 00:46:00.120648 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.121322 kubelet[2820]: E0702 00:46:00.120979 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.121322 kubelet[2820]: W0702 00:46:00.121000 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.121322 kubelet[2820]: E0702 00:46:00.121026 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.121764 kubelet[2820]: E0702 00:46:00.121725 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.121764 kubelet[2820]: W0702 00:46:00.121756 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.121888 kubelet[2820]: E0702 00:46:00.121786 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.121888 kubelet[2820]: E0702 00:46:00.121831 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.122046 kubelet[2820]: E0702 00:46:00.122020 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.126639 kubelet[2820]: E0702 00:46:00.126584 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.126639 kubelet[2820]: W0702 00:46:00.126625 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.126908 kubelet[2820]: E0702 00:46:00.126682 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.127135 kubelet[2820]: E0702 00:46:00.127101 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.127135 kubelet[2820]: W0702 00:46:00.127129 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.127366 kubelet[2820]: E0702 00:46:00.127322 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.127639 kubelet[2820]: E0702 00:46:00.127562 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.127639 kubelet[2820]: W0702 00:46:00.127593 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.127639 kubelet[2820]: E0702 00:46:00.127636 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.128026 kubelet[2820]: E0702 00:46:00.127993 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.128026 kubelet[2820]: W0702 00:46:00.128020 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.128168 kubelet[2820]: E0702 00:46:00.128056 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.128424 kubelet[2820]: E0702 00:46:00.128389 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.128424 kubelet[2820]: W0702 00:46:00.128417 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.128637 kubelet[2820]: E0702 00:46:00.128473 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.132516 kubelet[2820]: E0702 00:46:00.132437 2820 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:00.132516 kubelet[2820]: W0702 00:46:00.132503 2820 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:00.132725 kubelet[2820]: E0702 00:46:00.132542 2820 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:00.214860 env[1742]: time="2024-07-02T00:46:00.214777371Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:00.220474 env[1742]: time="2024-07-02T00:46:00.220380133Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:00.225495 env[1742]: time="2024-07-02T00:46:00.225397954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:00.230425 env[1742]: time="2024-07-02T00:46:00.230328798Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:00.233145 env[1742]: time="2024-07-02T00:46:00.231873218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064\"" Jul 2 00:46:00.235840 env[1742]: time="2024-07-02T00:46:00.235757114Z" level=info msg="CreateContainer within sandbox \"500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 00:46:00.304329 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount77980845.mount: Deactivated successfully. Jul 2 00:46:00.315313 env[1742]: time="2024-07-02T00:46:00.315252917Z" level=info msg="CreateContainer within sandbox \"500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8\"" Jul 2 00:46:00.316465 env[1742]: time="2024-07-02T00:46:00.316398339Z" level=info msg="StartContainer for \"8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8\"" Jul 2 00:46:00.378033 systemd[1]: Started cri-containerd-8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8.scope. Jul 2 00:46:00.428000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.428000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3254 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:00.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863616336373837633634326265373963626438353264333564303431 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.429000 audit: BPF prog-id=130 op=LOAD Jul 2 00:46:00.429000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3254 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:00.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863616336373837633634326265373963626438353264333564303431 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.431000 audit: BPF prog-id=131 op=LOAD Jul 2 00:46:00.431000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3254 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:00.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863616336373837633634326265373963626438353264333564303431 Jul 2 00:46:00.432000 audit: BPF prog-id=131 op=UNLOAD Jul 2 00:46:00.432000 audit: BPF prog-id=130 op=UNLOAD Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:00.432000 audit: BPF prog-id=132 op=LOAD Jul 2 00:46:00.432000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3254 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:00.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863616336373837633634326265373963626438353264333564303431 Jul 2 00:46:00.474182 env[1742]: time="2024-07-02T00:46:00.474094007Z" level=info msg="StartContainer for \"8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8\" returns successfully" Jul 2 00:46:00.515834 systemd[1]: cri-containerd-8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8.scope: Deactivated successfully. Jul 2 00:46:00.519000 audit: BPF prog-id=132 op=UNLOAD Jul 2 00:46:00.982838 systemd[1]: run-containerd-runc-k8s.io-8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8-runc.PbawaL.mount: Deactivated successfully. Jul 2 00:46:00.983015 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8-rootfs.mount: Deactivated successfully. Jul 2 00:46:01.040770 kubelet[2820]: I0702 00:46:01.040733 2820 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:46:01.222212 env[1742]: time="2024-07-02T00:46:01.222112040Z" level=info msg="shim disconnected" id=8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8 Jul 2 00:46:01.222212 env[1742]: time="2024-07-02T00:46:01.222201213Z" level=warning msg="cleaning up after shim disconnected" id=8cac6787c642be79cbd852d35d04183c03863d2ea0c7773e1c00332a91593df8 namespace=k8s.io Jul 2 00:46:01.222918 env[1742]: time="2024-07-02T00:46:01.222225397Z" level=info msg="cleaning up dead shim" Jul 2 00:46:01.236880 env[1742]: time="2024-07-02T00:46:01.236719673Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:46:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3424 runtime=io.containerd.runc.v2\n" Jul 2 00:46:01.827478 kubelet[2820]: E0702 00:46:01.827390 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:46:02.049191 env[1742]: time="2024-07-02T00:46:02.048858355Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 00:46:03.827195 kubelet[2820]: E0702 00:46:03.827153 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:46:05.826285 kubelet[2820]: E0702 00:46:05.825842 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:46:06.806485 env[1742]: time="2024-07-02T00:46:06.806375693Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:06.809808 env[1742]: time="2024-07-02T00:46:06.809755533Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:06.812830 env[1742]: time="2024-07-02T00:46:06.812781145Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:06.815793 env[1742]: time="2024-07-02T00:46:06.815745285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:06.817145 env[1742]: time="2024-07-02T00:46:06.817086762Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee\"" Jul 2 00:46:06.827499 env[1742]: time="2024-07-02T00:46:06.825932976Z" level=info msg="CreateContainer within sandbox \"500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 00:46:06.856839 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2675968437.mount: Deactivated successfully. Jul 2 00:46:06.869405 env[1742]: time="2024-07-02T00:46:06.869339790Z" level=info msg="CreateContainer within sandbox \"500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"18cecbd4add63985513220876485643e1f8991de665a54f523467d4eb0d89844\"" Jul 2 00:46:06.870656 env[1742]: time="2024-07-02T00:46:06.870581078Z" level=info msg="StartContainer for \"18cecbd4add63985513220876485643e1f8991de665a54f523467d4eb0d89844\"" Jul 2 00:46:06.920746 systemd[1]: Started cri-containerd-18cecbd4add63985513220876485643e1f8991de665a54f523467d4eb0d89844.scope. Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.953695 kernel: kauditd_printk_skb: 211 callbacks suppressed Jul 2 00:46:06.953831 kernel: audit: type=1400 audit(1719881166.950:972): avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3254 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:06.969671 kernel: audit: type=1300 audit(1719881166.950:972): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3254 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:06.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138636563626434616464363339383535313332323038373634383536 Jul 2 00:46:06.979479 kernel: audit: type=1327 audit(1719881166.950:972): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138636563626434616464363339383535313332323038373634383536 Jul 2 00:46:06.979762 kernel: audit: type=1400 audit(1719881166.950:973): avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:07.001839 kernel: audit: type=1400 audit(1719881166.950:973): avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:07.001958 kernel: audit: type=1400 audit(1719881166.950:973): avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:07.015513 kernel: audit: type=1400 audit(1719881166.950:973): avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:07.015647 kernel: audit: type=1400 audit(1719881166.950:973): avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:07.032489 kernel: audit: type=1400 audit(1719881166.950:973): avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:07.032610 kernel: audit: type=1400 audit(1719881166.950:973): avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit: BPF prog-id=133 op=LOAD Jul 2 00:46:06.950000 audit[3445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3254 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:06.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138636563626434616464363339383535313332323038373634383536 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.950000 audit: BPF prog-id=134 op=LOAD Jul 2 00:46:06.950000 audit[3445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3254 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:06.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138636563626434616464363339383535313332323038373634383536 Jul 2 00:46:06.951000 audit: BPF prog-id=134 op=UNLOAD Jul 2 00:46:06.951000 audit: BPF prog-id=133 op=UNLOAD Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:06.951000 audit: BPF prog-id=135 op=LOAD Jul 2 00:46:06.951000 audit[3445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3254 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:06.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138636563626434616464363339383535313332323038373634383536 Jul 2 00:46:07.047832 env[1742]: time="2024-07-02T00:46:07.047768284Z" level=info msg="StartContainer for \"18cecbd4add63985513220876485643e1f8991de665a54f523467d4eb0d89844\" returns successfully" Jul 2 00:46:07.827674 kubelet[2820]: E0702 00:46:07.827629 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:46:07.965327 env[1742]: time="2024-07-02T00:46:07.965219427Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:46:07.969880 systemd[1]: cri-containerd-18cecbd4add63985513220876485643e1f8991de665a54f523467d4eb0d89844.scope: Deactivated successfully. Jul 2 00:46:07.972000 audit: BPF prog-id=135 op=UNLOAD Jul 2 00:46:08.010296 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-18cecbd4add63985513220876485643e1f8991de665a54f523467d4eb0d89844-rootfs.mount: Deactivated successfully. Jul 2 00:46:08.067110 kubelet[2820]: I0702 00:46:08.066576 2820 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 00:46:08.112293 kubelet[2820]: I0702 00:46:08.112141 2820 topology_manager.go:215] "Topology Admit Handler" podUID="56006743-e6f3-442c-ab85-00249bd3fe78" podNamespace="kube-system" podName="coredns-76f75df574-72vtd" Jul 2 00:46:08.125104 systemd[1]: Created slice kubepods-burstable-pod56006743_e6f3_442c_ab85_00249bd3fe78.slice. Jul 2 00:46:08.136869 kubelet[2820]: I0702 00:46:08.136824 2820 topology_manager.go:215] "Topology Admit Handler" podUID="a93f21e7-f908-46d5-a047-059eb88e2cef" podNamespace="kube-system" podName="coredns-76f75df574-dxtzw" Jul 2 00:46:08.146198 kubelet[2820]: I0702 00:46:08.146157 2820 topology_manager.go:215] "Topology Admit Handler" podUID="77199baa-a7b6-49ca-9178-fe177bd5d53a" podNamespace="calico-system" podName="calico-kube-controllers-58c587f574-9nlll" Jul 2 00:46:08.156455 systemd[1]: Created slice kubepods-burstable-poda93f21e7_f908_46d5_a047_059eb88e2cef.slice. Jul 2 00:46:08.169596 systemd[1]: Created slice kubepods-besteffort-pod77199baa_a7b6_49ca_9178_fe177bd5d53a.slice. Jul 2 00:46:08.197203 kubelet[2820]: I0702 00:46:08.197121 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lmwcn\" (UniqueName: \"kubernetes.io/projected/a93f21e7-f908-46d5-a047-059eb88e2cef-kube-api-access-lmwcn\") pod \"coredns-76f75df574-dxtzw\" (UID: \"a93f21e7-f908-46d5-a047-059eb88e2cef\") " pod="kube-system/coredns-76f75df574-dxtzw" Jul 2 00:46:08.197651 kubelet[2820]: I0702 00:46:08.197621 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/77199baa-a7b6-49ca-9178-fe177bd5d53a-tigera-ca-bundle\") pod \"calico-kube-controllers-58c587f574-9nlll\" (UID: \"77199baa-a7b6-49ca-9178-fe177bd5d53a\") " pod="calico-system/calico-kube-controllers-58c587f574-9nlll" Jul 2 00:46:08.197925 kubelet[2820]: I0702 00:46:08.197887 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a93f21e7-f908-46d5-a047-059eb88e2cef-config-volume\") pod \"coredns-76f75df574-dxtzw\" (UID: \"a93f21e7-f908-46d5-a047-059eb88e2cef\") " pod="kube-system/coredns-76f75df574-dxtzw" Jul 2 00:46:08.198229 kubelet[2820]: I0702 00:46:08.198185 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vfrqf\" (UniqueName: \"kubernetes.io/projected/77199baa-a7b6-49ca-9178-fe177bd5d53a-kube-api-access-vfrqf\") pod \"calico-kube-controllers-58c587f574-9nlll\" (UID: \"77199baa-a7b6-49ca-9178-fe177bd5d53a\") " pod="calico-system/calico-kube-controllers-58c587f574-9nlll" Jul 2 00:46:08.198330 kubelet[2820]: I0702 00:46:08.198287 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/56006743-e6f3-442c-ab85-00249bd3fe78-config-volume\") pod \"coredns-76f75df574-72vtd\" (UID: \"56006743-e6f3-442c-ab85-00249bd3fe78\") " pod="kube-system/coredns-76f75df574-72vtd" Jul 2 00:46:08.198510 kubelet[2820]: I0702 00:46:08.198366 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qh8h6\" (UniqueName: \"kubernetes.io/projected/56006743-e6f3-442c-ab85-00249bd3fe78-kube-api-access-qh8h6\") pod \"coredns-76f75df574-72vtd\" (UID: \"56006743-e6f3-442c-ab85-00249bd3fe78\") " pod="kube-system/coredns-76f75df574-72vtd" Jul 2 00:46:08.432625 env[1742]: time="2024-07-02T00:46:08.432404607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-72vtd,Uid:56006743-e6f3-442c-ab85-00249bd3fe78,Namespace:kube-system,Attempt:0,}" Jul 2 00:46:08.489719 env[1742]: time="2024-07-02T00:46:08.488871216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58c587f574-9nlll,Uid:77199baa-a7b6-49ca-9178-fe177bd5d53a,Namespace:calico-system,Attempt:0,}" Jul 2 00:46:08.489719 env[1742]: time="2024-07-02T00:46:08.489384054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-dxtzw,Uid:a93f21e7-f908-46d5-a047-059eb88e2cef,Namespace:kube-system,Attempt:0,}" Jul 2 00:46:08.847023 env[1742]: time="2024-07-02T00:46:08.846945995Z" level=info msg="shim disconnected" id=18cecbd4add63985513220876485643e1f8991de665a54f523467d4eb0d89844 Jul 2 00:46:08.847023 env[1742]: time="2024-07-02T00:46:08.847016252Z" level=warning msg="cleaning up after shim disconnected" id=18cecbd4add63985513220876485643e1f8991de665a54f523467d4eb0d89844 namespace=k8s.io Jul 2 00:46:08.847300 env[1742]: time="2024-07-02T00:46:08.847038539Z" level=info msg="cleaning up dead shim" Jul 2 00:46:08.879236 env[1742]: time="2024-07-02T00:46:08.879169635Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:46:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3489 runtime=io.containerd.runc.v2\n" Jul 2 00:46:09.058607 env[1742]: time="2024-07-02T00:46:09.058500526Z" level=error msg="Failed to destroy network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.071206 env[1742]: time="2024-07-02T00:46:09.063352144Z" level=error msg="encountered an error cleaning up failed sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.071206 env[1742]: time="2024-07-02T00:46:09.063490546Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58c587f574-9nlll,Uid:77199baa-a7b6-49ca-9178-fe177bd5d53a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.066802 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80-shm.mount: Deactivated successfully. Jul 2 00:46:09.072276 kubelet[2820]: E0702 00:46:09.064570 2820 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.072276 kubelet[2820]: E0702 00:46:09.064704 2820 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58c587f574-9nlll" Jul 2 00:46:09.072276 kubelet[2820]: E0702 00:46:09.064746 2820 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58c587f574-9nlll" Jul 2 00:46:09.072962 kubelet[2820]: E0702 00:46:09.064886 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-58c587f574-9nlll_calico-system(77199baa-a7b6-49ca-9178-fe177bd5d53a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-58c587f574-9nlll_calico-system(77199baa-a7b6-49ca-9178-fe177bd5d53a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58c587f574-9nlll" podUID="77199baa-a7b6-49ca-9178-fe177bd5d53a" Jul 2 00:46:09.083958 kubelet[2820]: I0702 00:46:09.083639 2820 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:09.090484 env[1742]: time="2024-07-02T00:46:09.084467300Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 00:46:09.091158 env[1742]: time="2024-07-02T00:46:09.084780347Z" level=info msg="StopPodSandbox for \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\"" Jul 2 00:46:09.134507 env[1742]: time="2024-07-02T00:46:09.134318185Z" level=error msg="Failed to destroy network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.138608 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325-shm.mount: Deactivated successfully. Jul 2 00:46:09.140912 env[1742]: time="2024-07-02T00:46:09.140838232Z" level=error msg="encountered an error cleaning up failed sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.141219 env[1742]: time="2024-07-02T00:46:09.141165454Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-72vtd,Uid:56006743-e6f3-442c-ab85-00249bd3fe78,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.144214 kubelet[2820]: E0702 00:46:09.143667 2820 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.144214 kubelet[2820]: E0702 00:46:09.143774 2820 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-72vtd" Jul 2 00:46:09.144214 kubelet[2820]: E0702 00:46:09.143814 2820 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-72vtd" Jul 2 00:46:09.144599 kubelet[2820]: E0702 00:46:09.143916 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-72vtd_kube-system(56006743-e6f3-442c-ab85-00249bd3fe78)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-72vtd_kube-system(56006743-e6f3-442c-ab85-00249bd3fe78)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-72vtd" podUID="56006743-e6f3-442c-ab85-00249bd3fe78" Jul 2 00:46:09.166552 env[1742]: time="2024-07-02T00:46:09.166417752Z" level=error msg="Failed to destroy network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.171053 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033-shm.mount: Deactivated successfully. Jul 2 00:46:09.175900 kubelet[2820]: E0702 00:46:09.172751 2820 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.175900 kubelet[2820]: E0702 00:46:09.172824 2820 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-dxtzw" Jul 2 00:46:09.175900 kubelet[2820]: E0702 00:46:09.172867 2820 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-dxtzw" Jul 2 00:46:09.177369 env[1742]: time="2024-07-02T00:46:09.171052299Z" level=error msg="encountered an error cleaning up failed sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.177369 env[1742]: time="2024-07-02T00:46:09.171148443Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-dxtzw,Uid:a93f21e7-f908-46d5-a047-059eb88e2cef,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.178188 kubelet[2820]: E0702 00:46:09.172959 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-dxtzw_kube-system(a93f21e7-f908-46d5-a047-059eb88e2cef)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-dxtzw_kube-system(a93f21e7-f908-46d5-a047-059eb88e2cef)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-dxtzw" podUID="a93f21e7-f908-46d5-a047-059eb88e2cef" Jul 2 00:46:09.208332 env[1742]: time="2024-07-02T00:46:09.208219007Z" level=error msg="StopPodSandbox for \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\" failed" error="failed to destroy network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:09.208707 kubelet[2820]: E0702 00:46:09.208666 2820 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:09.208812 kubelet[2820]: E0702 00:46:09.208799 2820 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80"} Jul 2 00:46:09.208920 kubelet[2820]: E0702 00:46:09.208889 2820 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"77199baa-a7b6-49ca-9178-fe177bd5d53a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:46:09.209090 kubelet[2820]: E0702 00:46:09.208973 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"77199baa-a7b6-49ca-9178-fe177bd5d53a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58c587f574-9nlll" podUID="77199baa-a7b6-49ca-9178-fe177bd5d53a" Jul 2 00:46:09.835187 systemd[1]: Created slice kubepods-besteffort-pod14f15b9d_f3a9_4a23_9fb1_cf5a71e677b7.slice. Jul 2 00:46:09.840018 env[1742]: time="2024-07-02T00:46:09.839955941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7wf2w,Uid:14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7,Namespace:calico-system,Attempt:0,}" Jul 2 00:46:10.002350 env[1742]: time="2024-07-02T00:46:10.002222020Z" level=error msg="Failed to destroy network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:10.003225 env[1742]: time="2024-07-02T00:46:10.003170956Z" level=error msg="encountered an error cleaning up failed sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:10.003506 env[1742]: time="2024-07-02T00:46:10.003423156Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7wf2w,Uid:14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:10.008560 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3-shm.mount: Deactivated successfully. Jul 2 00:46:10.010653 kubelet[2820]: E0702 00:46:10.003972 2820 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:10.010653 kubelet[2820]: E0702 00:46:10.008903 2820 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7wf2w" Jul 2 00:46:10.010653 kubelet[2820]: E0702 00:46:10.008949 2820 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7wf2w" Jul 2 00:46:10.010886 kubelet[2820]: E0702 00:46:10.009038 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7wf2w_calico-system(14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7wf2w_calico-system(14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:46:10.088901 kubelet[2820]: I0702 00:46:10.087788 2820 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:10.091896 env[1742]: time="2024-07-02T00:46:10.091828146Z" level=info msg="StopPodSandbox for \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\"" Jul 2 00:46:10.095401 kubelet[2820]: I0702 00:46:10.095345 2820 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:10.098023 env[1742]: time="2024-07-02T00:46:10.097945173Z" level=info msg="StopPodSandbox for \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\"" Jul 2 00:46:10.101409 kubelet[2820]: I0702 00:46:10.100573 2820 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:10.105192 env[1742]: time="2024-07-02T00:46:10.105066042Z" level=info msg="StopPodSandbox for \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\"" Jul 2 00:46:10.216797 env[1742]: time="2024-07-02T00:46:10.216609673Z" level=error msg="StopPodSandbox for \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\" failed" error="failed to destroy network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:10.217074 kubelet[2820]: E0702 00:46:10.216962 2820 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:10.217074 kubelet[2820]: E0702 00:46:10.217025 2820 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3"} Jul 2 00:46:10.217236 kubelet[2820]: E0702 00:46:10.217088 2820 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:46:10.217236 kubelet[2820]: E0702 00:46:10.217140 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7wf2w" podUID="14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7" Jul 2 00:46:10.237813 env[1742]: time="2024-07-02T00:46:10.237717105Z" level=error msg="StopPodSandbox for \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\" failed" error="failed to destroy network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:10.238378 kubelet[2820]: E0702 00:46:10.238320 2820 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:10.238537 kubelet[2820]: E0702 00:46:10.238394 2820 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325"} Jul 2 00:46:10.238537 kubelet[2820]: E0702 00:46:10.238515 2820 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"56006743-e6f3-442c-ab85-00249bd3fe78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:46:10.238712 kubelet[2820]: E0702 00:46:10.238574 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"56006743-e6f3-442c-ab85-00249bd3fe78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-72vtd" podUID="56006743-e6f3-442c-ab85-00249bd3fe78" Jul 2 00:46:10.252481 env[1742]: time="2024-07-02T00:46:10.252354570Z" level=error msg="StopPodSandbox for \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\" failed" error="failed to destroy network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:46:10.253317 kubelet[2820]: E0702 00:46:10.252934 2820 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:10.253317 kubelet[2820]: E0702 00:46:10.253075 2820 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033"} Jul 2 00:46:10.253317 kubelet[2820]: E0702 00:46:10.253174 2820 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a93f21e7-f908-46d5-a047-059eb88e2cef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:46:10.253317 kubelet[2820]: E0702 00:46:10.253254 2820 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a93f21e7-f908-46d5-a047-059eb88e2cef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-dxtzw" podUID="a93f21e7-f908-46d5-a047-059eb88e2cef" Jul 2 00:46:16.615071 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2411825381.mount: Deactivated successfully. Jul 2 00:46:16.672698 env[1742]: time="2024-07-02T00:46:16.672638166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:16.675742 env[1742]: time="2024-07-02T00:46:16.675693215Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:16.678284 env[1742]: time="2024-07-02T00:46:16.678194025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:16.680975 env[1742]: time="2024-07-02T00:46:16.680910765Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:16.682233 env[1742]: time="2024-07-02T00:46:16.682180996Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f\"" Jul 2 00:46:16.712972 env[1742]: time="2024-07-02T00:46:16.712918113Z" level=info msg="CreateContainer within sandbox \"500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 00:46:16.742603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2664248896.mount: Deactivated successfully. Jul 2 00:46:16.752775 env[1742]: time="2024-07-02T00:46:16.752712146Z" level=info msg="CreateContainer within sandbox \"500fcd4758eccf96f09938504c8dde1da348e1d0df11aa8ac43ba483eff53a35\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"131fedf3c0db9fc67e32150ab124f5d57a9408a6d12c967dead943c44f1b6b01\"" Jul 2 00:46:16.755602 env[1742]: time="2024-07-02T00:46:16.755524105Z" level=info msg="StartContainer for \"131fedf3c0db9fc67e32150ab124f5d57a9408a6d12c967dead943c44f1b6b01\"" Jul 2 00:46:16.789480 systemd[1]: Started cri-containerd-131fedf3c0db9fc67e32150ab124f5d57a9408a6d12c967dead943c44f1b6b01.scope. Jul 2 00:46:16.846494 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 00:46:16.846679 kernel: audit: type=1400 audit(1719881176.836:979): avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3254 pid=3720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:16.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133316665646633633064623966633637653332313530616231323466 Jul 2 00:46:16.870152 kernel: audit: type=1300 audit(1719881176.836:979): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3254 pid=3720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:16.870298 kernel: audit: type=1327 audit(1719881176.836:979): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133316665646633633064623966633637653332313530616231323466 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.879656 kernel: audit: type=1400 audit(1719881176.836:980): avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.879774 kernel: audit: type=1400 audit(1719881176.836:980): avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.892772 kernel: audit: type=1400 audit(1719881176.836:980): avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.892881 kernel: audit: type=1400 audit(1719881176.836:980): avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.906469 kernel: audit: type=1400 audit(1719881176.836:980): avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.913931 kernel: audit: type=1400 audit(1719881176.836:980): avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.923391 kernel: audit: type=1400 audit(1719881176.836:980): avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.836000 audit: BPF prog-id=136 op=LOAD Jul 2 00:46:16.836000 audit[3720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3254 pid=3720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:16.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133316665646633633064623966633637653332313530616231323466 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.839000 audit: BPF prog-id=137 op=LOAD Jul 2 00:46:16.839000 audit[3720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3254 pid=3720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:16.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133316665646633633064623966633637653332313530616231323466 Jul 2 00:46:16.845000 audit: BPF prog-id=137 op=UNLOAD Jul 2 00:46:16.845000 audit: BPF prog-id=136 op=UNLOAD Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { perfmon } for pid=3720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit[3720]: AVC avc: denied { bpf } for pid=3720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:16.845000 audit: BPF prog-id=138 op=LOAD Jul 2 00:46:16.845000 audit[3720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3254 pid=3720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:16.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133316665646633633064623966633637653332313530616231323466 Jul 2 00:46:16.942564 env[1742]: time="2024-07-02T00:46:16.942481653Z" level=info msg="StartContainer for \"131fedf3c0db9fc67e32150ab124f5d57a9408a6d12c967dead943c44f1b6b01\" returns successfully" Jul 2 00:46:17.147237 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 00:46:17.147401 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 00:46:17.151135 kubelet[2820]: I0702 00:46:17.151071 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-c2jtw" podStartSLOduration=1.284258425 podStartE2EDuration="21.150986931s" podCreationTimestamp="2024-07-02 00:45:56 +0000 UTC" firstStartedPulling="2024-07-02 00:45:56.815931275 +0000 UTC m=+21.233545945" lastFinishedPulling="2024-07-02 00:46:16.682659781 +0000 UTC m=+41.100274451" observedRunningTime="2024-07-02 00:46:17.150223807 +0000 UTC m=+41.567838477" watchObservedRunningTime="2024-07-02 00:46:17.150986931 +0000 UTC m=+41.568601613" Jul 2 00:46:18.762000 audit[3823]: AVC avc: denied { write } for pid=3823 comm="tee" name="fd" dev="proc" ino=20092 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:46:18.767000 audit[3825]: AVC avc: denied { write } for pid=3825 comm="tee" name="fd" dev="proc" ino=21048 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:46:18.767000 audit[3825]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff15da0d a2=241 a3=1b6 items=1 ppid=3793 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.767000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 00:46:18.767000 audit: PATH item=0 name="/dev/fd/63" inode=20081 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:18.767000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:46:18.772000 audit[3839]: AVC avc: denied { write } for pid=3839 comm="tee" name="fd" dev="proc" ino=21053 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:46:18.772000 audit[3839]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc0b3ba1c a2=241 a3=1b6 items=1 ppid=3790 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.772000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 00:46:18.772000 audit: PATH item=0 name="/dev/fd/63" inode=20095 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:18.772000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:46:18.762000 audit[3823]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd63f1a1d a2=241 a3=1b6 items=1 ppid=3785 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.762000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 00:46:18.788000 audit[3845]: AVC avc: denied { write } for pid=3845 comm="tee" name="fd" dev="proc" ino=21058 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:46:18.788000 audit[3845]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda3aca0c a2=241 a3=1b6 items=1 ppid=3786 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.788000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 00:46:18.788000 audit: PATH item=0 name="/dev/fd/63" inode=20096 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:18.762000 audit: PATH item=0 name="/dev/fd/63" inode=20080 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:18.762000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:46:18.788000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:46:18.794000 audit[3846]: AVC avc: denied { write } for pid=3846 comm="tee" name="fd" dev="proc" ino=21062 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:46:18.794000 audit[3846]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffee102a1c a2=241 a3=1b6 items=1 ppid=3792 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.794000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 00:46:18.794000 audit: PATH item=0 name="/dev/fd/63" inode=21050 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:18.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:46:18.805000 audit[3848]: AVC avc: denied { write } for pid=3848 comm="tee" name="fd" dev="proc" ino=20109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:46:18.805000 audit[3848]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff02e2a1c a2=241 a3=1b6 items=1 ppid=3789 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.815520 kubelet[2820]: I0702 00:46:18.815482 2820 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:46:18.805000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 00:46:18.805000 audit: PATH item=0 name="/dev/fd/63" inode=20097 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:18.805000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:46:18.817000 audit[3852]: AVC avc: denied { write } for pid=3852 comm="tee" name="fd" dev="proc" ino=20116 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:46:18.817000 audit[3852]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffecf90a1e a2=241 a3=1b6 items=1 ppid=3798 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.817000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 00:46:18.817000 audit: PATH item=0 name="/dev/fd/63" inode=21055 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:18.817000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:46:18.990000 audit[3862]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:18.990000 audit[3862]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffc2fff8a0 a2=0 a3=1 items=0 ppid=2962 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:18.992000 audit[3862]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:18.992000 audit[3862]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffc2fff8a0 a2=0 a3=1 items=0 ppid=2962 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:18.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:19.553531 (udev-worker)[3751]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:46:19.554898 systemd-networkd[1461]: vxlan.calico: Link UP Jul 2 00:46:19.554906 systemd-networkd[1461]: vxlan.calico: Gained carrier Jul 2 00:46:19.599647 (udev-worker)[3921]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit: BPF prog-id=139 op=LOAD Jul 2 00:46:19.598000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeeac66a8 a2=70 a3=ffffeeac6718 items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.598000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.598000 audit: BPF prog-id=139 op=UNLOAD Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit: BPF prog-id=140 op=LOAD Jul 2 00:46:19.598000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeeac66a8 a2=70 a3=4b243c items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.598000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.598000 audit: BPF prog-id=140 op=UNLOAD Jul 2 00:46:19.598000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.598000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeeac6660 a2=70 a3=ffffeeac66d0 items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.598000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit: BPF prog-id=141 op=LOAD Jul 2 00:46:19.599000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffeeac6648 a2=70 a3=ffffeeac66b8 items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.599000 audit: BPF prog-id=141 op=UNLOAD Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeac6718 a2=70 a3=0 items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeac6708 a2=70 a3=0 items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.599000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.599000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeac6678 a2=70 a3=0 items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffeeac6750 a2=70 a3=caba42f items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeeac6750 a2=70 a3=caba42f items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.600000 audit: BPF prog-id=142 op=LOAD Jul 2 00:46:19.600000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeeac6678 a2=70 a3=caba449 items=0 ppid=3796 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:46:19.607000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.607000 audit[3931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc76f19b8 a2=70 a3=ffffc76f1a28 items=0 ppid=3796 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 00:46:19.611000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:19.611000 audit[3931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc76f1888 a2=70 a3=ffffc76f18f8 items=0 ppid=3796 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 00:46:19.624000 audit: BPF prog-id=142 op=UNLOAD Jul 2 00:46:19.737000 audit[3958]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3958 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:19.737000 audit[3958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe13b04a0 a2=0 a3=ffffa55bcfa8 items=0 ppid=3796 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.737000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:19.750000 audit[3959]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3959 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:19.750000 audit[3959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe24fc720 a2=0 a3=ffffb2d34fa8 items=0 ppid=3796 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:19.760000 audit[3960]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3960 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:19.760000 audit[3960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=fffff960d340 a2=0 a3=ffff80dc4fa8 items=0 ppid=3796 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:19.769000 audit[3962]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3962 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:19.769000 audit[3962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd2946970 a2=0 a3=ffffa673efa8 items=0 ppid=3796 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:19.769000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:19.815103 kubelet[2820]: I0702 00:46:19.813643 2820 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:46:19.857816 systemd[1]: run-containerd-runc-k8s.io-131fedf3c0db9fc67e32150ab124f5d57a9408a6d12c967dead943c44f1b6b01-runc.NattTh.mount: Deactivated successfully. Jul 2 00:46:20.028738 systemd[1]: run-containerd-runc-k8s.io-131fedf3c0db9fc67e32150ab124f5d57a9408a6d12c967dead943c44f1b6b01-runc.t709Qd.mount: Deactivated successfully. Jul 2 00:46:20.786698 systemd-networkd[1461]: vxlan.calico: Gained IPv6LL Jul 2 00:46:22.826825 env[1742]: time="2024-07-02T00:46:22.825864658Z" level=info msg="StopPodSandbox for \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\"" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:22.946 [INFO][4033] k8s.go 608: Cleaning up netns ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:22.946 [INFO][4033] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" iface="eth0" netns="/var/run/netns/cni-bf1ac930-388f-89d1-de85-30aea584843f" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:22.946 [INFO][4033] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" iface="eth0" netns="/var/run/netns/cni-bf1ac930-388f-89d1-de85-30aea584843f" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:22.949 [INFO][4033] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" iface="eth0" netns="/var/run/netns/cni-bf1ac930-388f-89d1-de85-30aea584843f" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:22.950 [INFO][4033] k8s.go 615: Releasing IP address(es) ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:22.950 [INFO][4033] utils.go 188: Calico CNI releasing IP address ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:23.011 [INFO][4039] ipam_plugin.go 411: Releasing address using handleID ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:23.011 [INFO][4039] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:23.011 [INFO][4039] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:23.077 [WARNING][4039] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:23.077 [INFO][4039] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:23.089 [INFO][4039] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:23.094535 env[1742]: 2024-07-02 00:46:23.091 [INFO][4033] k8s.go 621: Teardown processing complete. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:23.099663 env[1742]: time="2024-07-02T00:46:23.099597332Z" level=info msg="TearDown network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\" successfully" Jul 2 00:46:23.099877 env[1742]: time="2024-07-02T00:46:23.099842917Z" level=info msg="StopPodSandbox for \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\" returns successfully" Jul 2 00:46:23.100053 systemd[1]: run-netns-cni\x2dbf1ac930\x2d388f\x2d89d1\x2dde85\x2d30aea584843f.mount: Deactivated successfully. Jul 2 00:46:23.102840 env[1742]: time="2024-07-02T00:46:23.102427068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7wf2w,Uid:14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7,Namespace:calico-system,Attempt:1,}" Jul 2 00:46:23.361694 (udev-worker)[4069]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:46:23.363144 systemd-networkd[1461]: cali0befb1c6c95: Link UP Jul 2 00:46:23.369747 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:46:23.369888 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0befb1c6c95: link becomes ready Jul 2 00:46:23.369398 systemd-networkd[1461]: cali0befb1c6c95: Gained carrier Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.220 [INFO][4050] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0 csi-node-driver- calico-system 14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7 724 0 2024-07-02 00:45:56 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-27-140 csi-node-driver-7wf2w eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali0befb1c6c95 [] []}} ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Namespace="calico-system" Pod="csi-node-driver-7wf2w" WorkloadEndpoint="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.221 [INFO][4050] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Namespace="calico-system" Pod="csi-node-driver-7wf2w" WorkloadEndpoint="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.277 [INFO][4062] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" HandleID="k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.294 [INFO][4062] ipam_plugin.go 264: Auto assigning IP ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" HandleID="k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263e20), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-140", "pod":"csi-node-driver-7wf2w", "timestamp":"2024-07-02 00:46:23.277113118 +0000 UTC"}, Hostname:"ip-172-31-27-140", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.294 [INFO][4062] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.295 [INFO][4062] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.295 [INFO][4062] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-140' Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.297 [INFO][4062] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.308 [INFO][4062] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.319 [INFO][4062] ipam.go 489: Trying affinity for 192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.322 [INFO][4062] ipam.go 155: Attempting to load block cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.326 [INFO][4062] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.326 [INFO][4062] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.0/26 handle="k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.330 [INFO][4062] ipam.go 1685: Creating new handle: k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7 Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.336 [INFO][4062] ipam.go 1203: Writing block in order to claim IPs block=192.168.91.0/26 handle="k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.344 [INFO][4062] ipam.go 1216: Successfully claimed IPs: [192.168.91.1/26] block=192.168.91.0/26 handle="k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.345 [INFO][4062] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.1/26] handle="k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" host="ip-172-31-27-140" Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.345 [INFO][4062] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:23.391634 env[1742]: 2024-07-02 00:46:23.345 [INFO][4062] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.91.1/26] IPv6=[] ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" HandleID="k8s-pod-network.5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.392964 env[1742]: 2024-07-02 00:46:23.350 [INFO][4050] k8s.go 386: Populated endpoint ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Namespace="calico-system" Pod="csi-node-driver-7wf2w" WorkloadEndpoint="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"", Pod:"csi-node-driver-7wf2w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0befb1c6c95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:23.392964 env[1742]: 2024-07-02 00:46:23.350 [INFO][4050] k8s.go 387: Calico CNI using IPs: [192.168.91.1/32] ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Namespace="calico-system" Pod="csi-node-driver-7wf2w" WorkloadEndpoint="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.392964 env[1742]: 2024-07-02 00:46:23.350 [INFO][4050] dataplane_linux.go 68: Setting the host side veth name to cali0befb1c6c95 ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Namespace="calico-system" Pod="csi-node-driver-7wf2w" WorkloadEndpoint="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.392964 env[1742]: 2024-07-02 00:46:23.371 [INFO][4050] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Namespace="calico-system" Pod="csi-node-driver-7wf2w" WorkloadEndpoint="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.392964 env[1742]: 2024-07-02 00:46:23.372 [INFO][4050] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Namespace="calico-system" Pod="csi-node-driver-7wf2w" WorkloadEndpoint="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7", Pod:"csi-node-driver-7wf2w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0befb1c6c95", MAC:"b2:b3:ae:27:77:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:23.392964 env[1742]: 2024-07-02 00:46:23.388 [INFO][4050] k8s.go 500: Wrote updated endpoint to datastore ContainerID="5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7" Namespace="calico-system" Pod="csi-node-driver-7wf2w" WorkloadEndpoint="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:23.428337 env[1742]: time="2024-07-02T00:46:23.428162783Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:46:23.428594 env[1742]: time="2024-07-02T00:46:23.428362810Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:46:23.428594 env[1742]: time="2024-07-02T00:46:23.428473484Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:46:23.429134 env[1742]: time="2024-07-02T00:46:23.429017484Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7 pid=4093 runtime=io.containerd.runc.v2 Jul 2 00:46:23.435000 audit[4102]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:23.438867 kernel: kauditd_printk_skb: 163 callbacks suppressed Jul 2 00:46:23.439006 kernel: audit: type=1325 audit(1719881183.435:1014): table=filter:101 family=2 entries=34 op=nft_register_chain pid=4102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:23.435000 audit[4102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd6decb10 a2=0 a3=ffffbaf51fa8 items=0 ppid=3796 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.455830 kernel: audit: type=1300 audit(1719881183.435:1014): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd6decb10 a2=0 a3=ffffbaf51fa8 items=0 ppid=3796 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.435000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:23.463592 kernel: audit: type=1327 audit(1719881183.435:1014): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:23.520066 systemd[1]: Started cri-containerd-5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7.scope. Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553946 kernel: audit: type=1400 audit(1719881183.539:1015): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.554059 kernel: audit: type=1400 audit(1719881183.539:1016): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.562776 kernel: audit: type=1400 audit(1719881183.539:1017): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.569511 kernel: audit: type=1400 audit(1719881183.539:1018): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.576611 kernel: audit: type=1400 audit(1719881183.539:1019): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.583551 kernel: audit: type=1400 audit(1719881183.539:1020): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.583647 kernel: audit: type=1400 audit(1719881183.539:1021): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.546000 audit: BPF prog-id=143 op=LOAD Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4093 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566663532663333323965383831356339666632356664303934383034 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4093 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566663532663333323965383831356339666632356664303934383034 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit: BPF prog-id=144 op=LOAD Jul 2 00:46:23.553000 audit[4103]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4093 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566663532663333323965383831356339666632356664303934383034 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit: BPF prog-id=145 op=LOAD Jul 2 00:46:23.553000 audit[4103]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4093 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566663532663333323965383831356339666632356664303934383034 Jul 2 00:46:23.553000 audit: BPF prog-id=145 op=UNLOAD Jul 2 00:46:23.553000 audit: BPF prog-id=144 op=UNLOAD Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:23.553000 audit: BPF prog-id=146 op=LOAD Jul 2 00:46:23.553000 audit[4103]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4093 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566663532663333323965383831356339666632356664303934383034 Jul 2 00:46:23.627513 env[1742]: time="2024-07-02T00:46:23.619629678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7wf2w,Uid:14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7,Namespace:calico-system,Attempt:1,} returns sandbox id \"5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7\"" Jul 2 00:46:23.627513 env[1742]: time="2024-07-02T00:46:23.622874813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 00:46:23.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.140:22-139.178.89.65:52020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:23.759980 systemd[1]: Started sshd@7-172.31.27.140:22-139.178.89.65:52020.service. Jul 2 00:46:23.832785 env[1742]: time="2024-07-02T00:46:23.832475825Z" level=info msg="StopPodSandbox for \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\"" Jul 2 00:46:23.833802 env[1742]: time="2024-07-02T00:46:23.833596376Z" level=info msg="StopPodSandbox for \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\"" Jul 2 00:46:23.964000 audit[4128]: USER_ACCT pid=4128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:23.974534 sshd[4128]: Accepted publickey for core from 139.178.89.65 port 52020 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:23.974000 audit[4128]: CRED_ACQ pid=4128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:23.974000 audit[4128]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaff4a00 a2=3 a3=1 items=0 ppid=1 pid=4128 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:23.978616 sshd[4128]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:23.997729 systemd[1]: Started session-8.scope. Jul 2 00:46:23.999360 systemd-logind[1733]: New session 8 of user core. Jul 2 00:46:24.030000 audit[4128]: USER_START pid=4128 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:24.039000 audit[4169]: CRED_ACQ pid=4169 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.104 [INFO][4159] k8s.go 608: Cleaning up netns ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.104 [INFO][4159] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" iface="eth0" netns="/var/run/netns/cni-623ce22e-6776-2d6f-e098-512309ce957d" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.105 [INFO][4159] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" iface="eth0" netns="/var/run/netns/cni-623ce22e-6776-2d6f-e098-512309ce957d" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.105 [INFO][4159] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" iface="eth0" netns="/var/run/netns/cni-623ce22e-6776-2d6f-e098-512309ce957d" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.105 [INFO][4159] k8s.go 615: Releasing IP address(es) ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.105 [INFO][4159] utils.go 188: Calico CNI releasing IP address ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.246 [INFO][4172] ipam_plugin.go 411: Releasing address using handleID ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.249 [INFO][4172] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.252 [INFO][4172] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.298 [WARNING][4172] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.298 [INFO][4172] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.322 [INFO][4172] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:24.335672 env[1742]: 2024-07-02 00:46:24.327 [INFO][4159] k8s.go 621: Teardown processing complete. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:24.343141 systemd[1]: run-netns-cni\x2d623ce22e\x2d6776\x2d2d6f\x2de098\x2d512309ce957d.mount: Deactivated successfully. Jul 2 00:46:24.347745 env[1742]: time="2024-07-02T00:46:24.344854325Z" level=info msg="TearDown network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\" successfully" Jul 2 00:46:24.347745 env[1742]: time="2024-07-02T00:46:24.344911690Z" level=info msg="StopPodSandbox for \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\" returns successfully" Jul 2 00:46:24.348254 env[1742]: time="2024-07-02T00:46:24.348200845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-72vtd,Uid:56006743-e6f3-442c-ab85-00249bd3fe78,Namespace:kube-system,Attempt:1,}" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.208 [INFO][4160] k8s.go 608: Cleaning up netns ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.208 [INFO][4160] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" iface="eth0" netns="/var/run/netns/cni-32788a10-c71c-226f-ed6d-e17d4a9e4126" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.208 [INFO][4160] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" iface="eth0" netns="/var/run/netns/cni-32788a10-c71c-226f-ed6d-e17d4a9e4126" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.209 [INFO][4160] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" iface="eth0" netns="/var/run/netns/cni-32788a10-c71c-226f-ed6d-e17d4a9e4126" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.209 [INFO][4160] k8s.go 615: Releasing IP address(es) ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.209 [INFO][4160] utils.go 188: Calico CNI releasing IP address ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.329 [INFO][4184] ipam_plugin.go 411: Releasing address using handleID ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.330 [INFO][4184] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.330 [INFO][4184] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.375 [WARNING][4184] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.375 [INFO][4184] ipam_plugin.go 439: Releasing address using workloadID ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.382 [INFO][4184] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:24.414372 env[1742]: 2024-07-02 00:46:24.392 [INFO][4160] k8s.go 621: Teardown processing complete. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:24.423971 env[1742]: time="2024-07-02T00:46:24.420094794Z" level=info msg="TearDown network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\" successfully" Jul 2 00:46:24.423971 env[1742]: time="2024-07-02T00:46:24.420151415Z" level=info msg="StopPodSandbox for \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\" returns successfully" Jul 2 00:46:24.418806 systemd[1]: run-netns-cni\x2d32788a10\x2dc71c\x2d226f\x2ded6d\x2de17d4a9e4126.mount: Deactivated successfully. Jul 2 00:46:24.428786 env[1742]: time="2024-07-02T00:46:24.425816057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58c587f574-9nlll,Uid:77199baa-a7b6-49ca-9178-fe177bd5d53a,Namespace:calico-system,Attempt:1,}" Jul 2 00:46:24.437811 sshd[4128]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:24.441000 audit[4128]: USER_END pid=4128 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:24.442000 audit[4128]: CRED_DISP pid=4128 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:24.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.140:22-139.178.89.65:52020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:24.445756 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 00:46:24.446931 systemd[1]: sshd@7-172.31.27.140:22-139.178.89.65:52020.service: Deactivated successfully. Jul 2 00:46:24.451321 systemd-logind[1733]: Session 8 logged out. Waiting for processes to exit. Jul 2 00:46:24.454543 systemd-logind[1733]: Removed session 8. Jul 2 00:46:24.798316 (udev-worker)[4081]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:46:24.804824 systemd-networkd[1461]: cali3f4e9410b45: Link UP Jul 2 00:46:24.811021 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:46:24.811165 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3f4e9410b45: link becomes ready Jul 2 00:46:24.810633 systemd-networkd[1461]: cali3f4e9410b45: Gained carrier Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.581 [INFO][4193] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0 coredns-76f75df574- kube-system 56006743-e6f3-442c-ab85-00249bd3fe78 767 0 2024-07-02 00:45:48 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-140 coredns-76f75df574-72vtd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3f4e9410b45 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Namespace="kube-system" Pod="coredns-76f75df574-72vtd" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.581 [INFO][4193] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Namespace="kube-system" Pod="coredns-76f75df574-72vtd" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.676 [INFO][4220] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" HandleID="k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.695 [INFO][4220] ipam_plugin.go 264: Auto assigning IP ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" HandleID="k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002e77f0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-140", "pod":"coredns-76f75df574-72vtd", "timestamp":"2024-07-02 00:46:24.676144151 +0000 UTC"}, Hostname:"ip-172-31-27-140", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.695 [INFO][4220] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.695 [INFO][4220] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.696 [INFO][4220] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-140' Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.699 [INFO][4220] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.719 [INFO][4220] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.737 [INFO][4220] ipam.go 489: Trying affinity for 192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.741 [INFO][4220] ipam.go 155: Attempting to load block cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.748 [INFO][4220] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.748 [INFO][4220] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.0/26 handle="k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.753 [INFO][4220] ipam.go 1685: Creating new handle: k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515 Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.764 [INFO][4220] ipam.go 1203: Writing block in order to claim IPs block=192.168.91.0/26 handle="k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.780 [INFO][4220] ipam.go 1216: Successfully claimed IPs: [192.168.91.2/26] block=192.168.91.0/26 handle="k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.781 [INFO][4220] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.2/26] handle="k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" host="ip-172-31-27-140" Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.781 [INFO][4220] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:24.843832 env[1742]: 2024-07-02 00:46:24.782 [INFO][4220] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.91.2/26] IPv6=[] ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" HandleID="k8s-pod-network.75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.845822 env[1742]: 2024-07-02 00:46:24.793 [INFO][4193] k8s.go 386: Populated endpoint ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Namespace="kube-system" Pod="coredns-76f75df574-72vtd" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"56006743-e6f3-442c-ab85-00249bd3fe78", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"", Pod:"coredns-76f75df574-72vtd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.91.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3f4e9410b45", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:24.845822 env[1742]: 2024-07-02 00:46:24.793 [INFO][4193] k8s.go 387: Calico CNI using IPs: [192.168.91.2/32] ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Namespace="kube-system" Pod="coredns-76f75df574-72vtd" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.845822 env[1742]: 2024-07-02 00:46:24.793 [INFO][4193] dataplane_linux.go 68: Setting the host side veth name to cali3f4e9410b45 ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Namespace="kube-system" Pod="coredns-76f75df574-72vtd" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.845822 env[1742]: 2024-07-02 00:46:24.811 [INFO][4193] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Namespace="kube-system" Pod="coredns-76f75df574-72vtd" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.845822 env[1742]: 2024-07-02 00:46:24.812 [INFO][4193] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Namespace="kube-system" Pod="coredns-76f75df574-72vtd" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"56006743-e6f3-442c-ab85-00249bd3fe78", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515", Pod:"coredns-76f75df574-72vtd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.91.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3f4e9410b45", MAC:"76:14:65:45:9c:1d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:24.845822 env[1742]: 2024-07-02 00:46:24.839 [INFO][4193] k8s.go 500: Wrote updated endpoint to datastore ContainerID="75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515" Namespace="kube-system" Pod="coredns-76f75df574-72vtd" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:24.888432 env[1742]: time="2024-07-02T00:46:24.888309267Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:46:24.888840 env[1742]: time="2024-07-02T00:46:24.888736776Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:46:24.889091 env[1742]: time="2024-07-02T00:46:24.889024814Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:46:24.889672 env[1742]: time="2024-07-02T00:46:24.889593774Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515 pid=4257 runtime=io.containerd.runc.v2 Jul 2 00:46:24.922307 systemd-networkd[1461]: calid47c8735877: Link UP Jul 2 00:46:24.931040 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid47c8735877: link becomes ready Jul 2 00:46:24.930730 systemd-networkd[1461]: calid47c8735877: Gained carrier Jul 2 00:46:24.960403 systemd[1]: Started cri-containerd-75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515.scope. Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.596 [INFO][4204] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0 calico-kube-controllers-58c587f574- calico-system 77199baa-a7b6-49ca-9178-fe177bd5d53a 768 0 2024-07-02 00:45:56 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:58c587f574 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-27-140 calico-kube-controllers-58c587f574-9nlll eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid47c8735877 [] []}} ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Namespace="calico-system" Pod="calico-kube-controllers-58c587f574-9nlll" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.596 [INFO][4204] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Namespace="calico-system" Pod="calico-kube-controllers-58c587f574-9nlll" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.698 [INFO][4221] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" HandleID="k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.741 [INFO][4221] ipam_plugin.go 264: Auto assigning IP ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" HandleID="k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002be400), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-140", "pod":"calico-kube-controllers-58c587f574-9nlll", "timestamp":"2024-07-02 00:46:24.697995441 +0000 UTC"}, Hostname:"ip-172-31-27-140", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.742 [INFO][4221] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.781 [INFO][4221] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.781 [INFO][4221] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-140' Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.784 [INFO][4221] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.812 [INFO][4221] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.830 [INFO][4221] ipam.go 489: Trying affinity for 192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.834 [INFO][4221] ipam.go 155: Attempting to load block cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.853 [INFO][4221] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.853 [INFO][4221] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.0/26 handle="k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.867 [INFO][4221] ipam.go 1685: Creating new handle: k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.876 [INFO][4221] ipam.go 1203: Writing block in order to claim IPs block=192.168.91.0/26 handle="k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.903 [INFO][4221] ipam.go 1216: Successfully claimed IPs: [192.168.91.3/26] block=192.168.91.0/26 handle="k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.903 [INFO][4221] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.3/26] handle="k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" host="ip-172-31-27-140" Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.903 [INFO][4221] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:24.980203 env[1742]: 2024-07-02 00:46:24.903 [INFO][4221] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.91.3/26] IPv6=[] ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" HandleID="k8s-pod-network.bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.981710 env[1742]: 2024-07-02 00:46:24.908 [INFO][4204] k8s.go 386: Populated endpoint ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Namespace="calico-system" Pod="calico-kube-controllers-58c587f574-9nlll" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0", GenerateName:"calico-kube-controllers-58c587f574-", Namespace:"calico-system", SelfLink:"", UID:"77199baa-a7b6-49ca-9178-fe177bd5d53a", ResourceVersion:"768", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58c587f574", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"", Pod:"calico-kube-controllers-58c587f574-9nlll", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.91.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid47c8735877", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:24.981710 env[1742]: 2024-07-02 00:46:24.909 [INFO][4204] k8s.go 387: Calico CNI using IPs: [192.168.91.3/32] ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Namespace="calico-system" Pod="calico-kube-controllers-58c587f574-9nlll" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.981710 env[1742]: 2024-07-02 00:46:24.909 [INFO][4204] dataplane_linux.go 68: Setting the host side veth name to calid47c8735877 ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Namespace="calico-system" Pod="calico-kube-controllers-58c587f574-9nlll" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.981710 env[1742]: 2024-07-02 00:46:24.931 [INFO][4204] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Namespace="calico-system" Pod="calico-kube-controllers-58c587f574-9nlll" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:24.981710 env[1742]: 2024-07-02 00:46:24.933 [INFO][4204] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Namespace="calico-system" Pod="calico-kube-controllers-58c587f574-9nlll" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0", GenerateName:"calico-kube-controllers-58c587f574-", Namespace:"calico-system", SelfLink:"", UID:"77199baa-a7b6-49ca-9178-fe177bd5d53a", ResourceVersion:"768", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58c587f574", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f", Pod:"calico-kube-controllers-58c587f574-9nlll", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.91.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid47c8735877", MAC:"42:d0:be:a1:d8:9f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:24.981710 env[1742]: 2024-07-02 00:46:24.977 [INFO][4204] k8s.go 500: Wrote updated endpoint to datastore ContainerID="bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f" Namespace="calico-system" Pod="calico-kube-controllers-58c587f574-9nlll" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.016000 audit: BPF prog-id=147 op=LOAD Jul 2 00:46:25.018000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.018000 audit[4269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616431636638316235616166646539316238353530633965386634 Jul 2 00:46:25.018000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.018000 audit[4269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616431636638316235616166646539316238353530633965386634 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.020000 audit: BPF prog-id=148 op=LOAD Jul 2 00:46:25.020000 audit[4269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616431636638316235616166646539316238353530633965386634 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.021000 audit: BPF prog-id=149 op=LOAD Jul 2 00:46:25.021000 audit[4269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616431636638316235616166646539316238353530633965386634 Jul 2 00:46:25.023000 audit: BPF prog-id=149 op=UNLOAD Jul 2 00:46:25.023000 audit: BPF prog-id=148 op=UNLOAD Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.024000 audit: BPF prog-id=150 op=LOAD Jul 2 00:46:25.024000 audit[4269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616431636638316235616166646539316238353530633965386634 Jul 2 00:46:25.066470 env[1742]: time="2024-07-02T00:46:25.066244175Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:46:25.066687 env[1742]: time="2024-07-02T00:46:25.066326222Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:46:25.066687 env[1742]: time="2024-07-02T00:46:25.066354263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:46:25.080607 env[1742]: time="2024-07-02T00:46:25.071492751Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f pid=4304 runtime=io.containerd.runc.v2 Jul 2 00:46:25.144188 systemd[1]: Started cri-containerd-bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f.scope. Jul 2 00:46:25.147000 audit[4327]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4327 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:25.147000 audit[4327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffff5efb320 a2=0 a3=ffffb74e3fa8 items=0 ppid=3796 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.147000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:25.176794 env[1742]: time="2024-07-02T00:46:25.176738847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-72vtd,Uid:56006743-e6f3-442c-ab85-00249bd3fe78,Namespace:kube-system,Attempt:1,} returns sandbox id \"75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515\"" Jul 2 00:46:25.185961 env[1742]: time="2024-07-02T00:46:25.185899638Z" level=info msg="CreateContainer within sandbox \"75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 00:46:25.209000 audit[4337]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=4337 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:25.209000 audit[4337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19828 a0=3 a1=ffffce71c9f0 a2=0 a3=ffff9ce97fa8 items=0 ppid=3796 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.209000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:25.250932 env[1742]: time="2024-07-02T00:46:25.250867249Z" level=info msg="CreateContainer within sandbox \"75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a2b18be23d78947ef46de02a809dfa0e7afdd1f56de7230640fb7b9d1d4f7bb6\"" Jul 2 00:46:25.260972 env[1742]: time="2024-07-02T00:46:25.259835149Z" level=info msg="StartContainer for \"a2b18be23d78947ef46de02a809dfa0e7afdd1f56de7230640fb7b9d1d4f7bb6\"" Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.264000 audit: BPF prog-id=151 op=LOAD Jul 2 00:46:25.268010 systemd-networkd[1461]: cali0befb1c6c95: Gained IPv6LL Jul 2 00:46:25.267000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.267000 audit[4315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4304 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656561626239643035626663633337346564346131636661326431 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4304 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656561626239643035626663633337346564346131636661326431 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.268000 audit: BPF prog-id=152 op=LOAD Jul 2 00:46:25.268000 audit[4315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4304 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656561626239643035626663633337346564346131636661326431 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.270000 audit: BPF prog-id=153 op=LOAD Jul 2 00:46:25.270000 audit[4315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4304 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656561626239643035626663633337346564346131636661326431 Jul 2 00:46:25.271000 audit: BPF prog-id=153 op=UNLOAD Jul 2 00:46:25.272000 audit: BPF prog-id=152 op=UNLOAD Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { perfmon } for pid=4315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit[4315]: AVC avc: denied { bpf } for pid=4315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.272000 audit: BPF prog-id=154 op=LOAD Jul 2 00:46:25.272000 audit[4315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4304 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656561626239643035626663633337346564346131636661326431 Jul 2 00:46:25.377172 systemd[1]: Started cri-containerd-a2b18be23d78947ef46de02a809dfa0e7afdd1f56de7230640fb7b9d1d4f7bb6.scope. Jul 2 00:46:25.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.416000 audit: BPF prog-id=155 op=LOAD Jul 2 00:46:25.417000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.417000 audit[4355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4257 pid=4355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623138626532336437383934376566343664653032613830396466 Jul 2 00:46:25.417000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.417000 audit[4355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4257 pid=4355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623138626532336437383934376566343664653032613830396466 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit: BPF prog-id=156 op=LOAD Jul 2 00:46:25.418000 audit[4355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4257 pid=4355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623138626532336437383934376566343664653032613830396466 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.418000 audit: BPF prog-id=157 op=LOAD Jul 2 00:46:25.418000 audit[4355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4257 pid=4355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623138626532336437383934376566343664653032613830396466 Jul 2 00:46:25.419000 audit: BPF prog-id=157 op=UNLOAD Jul 2 00:46:25.419000 audit: BPF prog-id=156 op=UNLOAD Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { perfmon } for pid=4355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit[4355]: AVC avc: denied { bpf } for pid=4355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.419000 audit: BPF prog-id=158 op=LOAD Jul 2 00:46:25.419000 audit[4355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4257 pid=4355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623138626532336437383934376566343664653032613830396466 Jul 2 00:46:25.445070 env[1742]: time="2024-07-02T00:46:25.444876483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58c587f574-9nlll,Uid:77199baa-a7b6-49ca-9178-fe177bd5d53a,Namespace:calico-system,Attempt:1,} returns sandbox id \"bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f\"" Jul 2 00:46:25.475054 env[1742]: time="2024-07-02T00:46:25.474439527Z" level=info msg="StartContainer for \"a2b18be23d78947ef46de02a809dfa0e7afdd1f56de7230640fb7b9d1d4f7bb6\" returns successfully" Jul 2 00:46:25.543741 env[1742]: time="2024-07-02T00:46:25.543665730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:25.552308 env[1742]: time="2024-07-02T00:46:25.552241719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:25.556608 env[1742]: time="2024-07-02T00:46:25.556539930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:25.560748 env[1742]: time="2024-07-02T00:46:25.560683815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:25.562169 env[1742]: time="2024-07-02T00:46:25.562107837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed\"" Jul 2 00:46:25.565482 env[1742]: time="2024-07-02T00:46:25.565399567Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 00:46:25.567086 env[1742]: time="2024-07-02T00:46:25.567012124Z" level=info msg="CreateContainer within sandbox \"5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 00:46:25.602408 env[1742]: time="2024-07-02T00:46:25.602326594Z" level=info msg="CreateContainer within sandbox \"5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"86f335d6f1e98a97ad6e1163ed473a156499317672981900a1180d2c1481697e\"" Jul 2 00:46:25.605279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount475872074.mount: Deactivated successfully. Jul 2 00:46:25.611010 env[1742]: time="2024-07-02T00:46:25.610959000Z" level=info msg="StartContainer for \"86f335d6f1e98a97ad6e1163ed473a156499317672981900a1180d2c1481697e\"" Jul 2 00:46:25.654416 systemd[1]: Started cri-containerd-86f335d6f1e98a97ad6e1163ed473a156499317672981900a1180d2c1481697e.scope. Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4093 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663333356436663165393861393761643665313136336564343733 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit: BPF prog-id=159 op=LOAD Jul 2 00:46:25.699000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4093 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663333356436663165393861393761643665313136336564343733 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit: BPF prog-id=160 op=LOAD Jul 2 00:46:25.699000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4093 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663333356436663165393861393761643665313136336564343733 Jul 2 00:46:25.699000 audit: BPF prog-id=160 op=UNLOAD Jul 2 00:46:25.699000 audit: BPF prog-id=159 op=UNLOAD Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:25.699000 audit: BPF prog-id=161 op=LOAD Jul 2 00:46:25.699000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4093 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:25.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663333356436663165393861393761643665313136336564343733 Jul 2 00:46:25.740703 env[1742]: time="2024-07-02T00:46:25.740606567Z" level=info msg="StartContainer for \"86f335d6f1e98a97ad6e1163ed473a156499317672981900a1180d2c1481697e\" returns successfully" Jul 2 00:46:25.826862 env[1742]: time="2024-07-02T00:46:25.826436603Z" level=info msg="StopPodSandbox for \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\"" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.924 [INFO][4438] k8s.go 608: Cleaning up netns ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.925 [INFO][4438] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" iface="eth0" netns="/var/run/netns/cni-ec7dd420-8b17-be88-5067-e1978c83f120" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.925 [INFO][4438] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" iface="eth0" netns="/var/run/netns/cni-ec7dd420-8b17-be88-5067-e1978c83f120" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.926 [INFO][4438] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" iface="eth0" netns="/var/run/netns/cni-ec7dd420-8b17-be88-5067-e1978c83f120" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.926 [INFO][4438] k8s.go 615: Releasing IP address(es) ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.926 [INFO][4438] utils.go 188: Calico CNI releasing IP address ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.963 [INFO][4445] ipam_plugin.go 411: Releasing address using handleID ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.964 [INFO][4445] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.964 [INFO][4445] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.980 [WARNING][4445] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.980 [INFO][4445] ipam_plugin.go 439: Releasing address using workloadID ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.985 [INFO][4445] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:25.989624 env[1742]: 2024-07-02 00:46:25.987 [INFO][4438] k8s.go 621: Teardown processing complete. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:25.991307 env[1742]: time="2024-07-02T00:46:25.989884567Z" level=info msg="TearDown network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\" successfully" Jul 2 00:46:25.991307 env[1742]: time="2024-07-02T00:46:25.989935273Z" level=info msg="StopPodSandbox for \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\" returns successfully" Jul 2 00:46:25.992011 env[1742]: time="2024-07-02T00:46:25.991945897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-dxtzw,Uid:a93f21e7-f908-46d5-a047-059eb88e2cef,Namespace:kube-system,Attempt:1,}" Jul 2 00:46:26.203802 kubelet[2820]: I0702 00:46:26.203753 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-72vtd" podStartSLOduration=38.203698973 podStartE2EDuration="38.203698973s" podCreationTimestamp="2024-07-02 00:45:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:46:26.20219262 +0000 UTC m=+50.619807314" watchObservedRunningTime="2024-07-02 00:46:26.203698973 +0000 UTC m=+50.621313643" Jul 2 00:46:26.226739 systemd-networkd[1461]: calid47c8735877: Gained IPv6LL Jul 2 00:46:26.290702 systemd-networkd[1461]: cali3f4e9410b45: Gained IPv6LL Jul 2 00:46:26.302000 audit[4472]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=4472 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:26.302000 audit[4472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffffba819a0 a2=0 a3=1 items=0 ppid=2962 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:26.304000 audit[4472]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4472 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:26.304000 audit[4472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffffba819a0 a2=0 a3=1 items=0 ppid=2962 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:26.316151 systemd-networkd[1461]: cali55bdbf94470: Link UP Jul 2 00:46:26.327321 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:46:26.328223 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali55bdbf94470: link becomes ready Jul 2 00:46:26.328000 audit[4476]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=4476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:26.328000 audit[4476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff4b4efd0 a2=0 a3=1 items=0 ppid=2962 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.328000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:26.333899 systemd-networkd[1461]: cali55bdbf94470: Gained carrier Jul 2 00:46:26.336000 audit[4476]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:26.336000 audit[4476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffff4b4efd0 a2=0 a3=1 items=0 ppid=2962 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:26.345856 systemd[1]: run-netns-cni\x2dec7dd420\x2d8b17\x2dbe88\x2d5067\x2de1978c83f120.mount: Deactivated successfully. Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.069 [INFO][4452] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0 coredns-76f75df574- kube-system a93f21e7-f908-46d5-a047-059eb88e2cef 789 0 2024-07-02 00:45:48 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-140 coredns-76f75df574-dxtzw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali55bdbf94470 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Namespace="kube-system" Pod="coredns-76f75df574-dxtzw" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.070 [INFO][4452] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Namespace="kube-system" Pod="coredns-76f75df574-dxtzw" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.136 [INFO][4463] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" HandleID="k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.152 [INFO][4463] ipam_plugin.go 264: Auto assigning IP ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" HandleID="k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318370), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-140", "pod":"coredns-76f75df574-dxtzw", "timestamp":"2024-07-02 00:46:26.136234396 +0000 UTC"}, Hostname:"ip-172-31-27-140", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.152 [INFO][4463] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.153 [INFO][4463] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.153 [INFO][4463] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-140' Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.156 [INFO][4463] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.164 [INFO][4463] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.222 [INFO][4463] ipam.go 489: Trying affinity for 192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.232 [INFO][4463] ipam.go 155: Attempting to load block cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.252 [INFO][4463] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.252 [INFO][4463] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.0/26 handle="k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.256 [INFO][4463] ipam.go 1685: Creating new handle: k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.272 [INFO][4463] ipam.go 1203: Writing block in order to claim IPs block=192.168.91.0/26 handle="k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.289 [INFO][4463] ipam.go 1216: Successfully claimed IPs: [192.168.91.4/26] block=192.168.91.0/26 handle="k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.289 [INFO][4463] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.4/26] handle="k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" host="ip-172-31-27-140" Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.289 [INFO][4463] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:26.367474 env[1742]: 2024-07-02 00:46:26.289 [INFO][4463] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.91.4/26] IPv6=[] ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" HandleID="k8s-pod-network.4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:26.369011 env[1742]: 2024-07-02 00:46:26.295 [INFO][4452] k8s.go 386: Populated endpoint ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Namespace="kube-system" Pod="coredns-76f75df574-dxtzw" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"a93f21e7-f908-46d5-a047-059eb88e2cef", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"", Pod:"coredns-76f75df574-dxtzw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.91.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali55bdbf94470", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:26.369011 env[1742]: 2024-07-02 00:46:26.296 [INFO][4452] k8s.go 387: Calico CNI using IPs: [192.168.91.4/32] ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Namespace="kube-system" Pod="coredns-76f75df574-dxtzw" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:26.369011 env[1742]: 2024-07-02 00:46:26.296 [INFO][4452] dataplane_linux.go 68: Setting the host side veth name to cali55bdbf94470 ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Namespace="kube-system" Pod="coredns-76f75df574-dxtzw" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:26.369011 env[1742]: 2024-07-02 00:46:26.329 [INFO][4452] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Namespace="kube-system" Pod="coredns-76f75df574-dxtzw" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:26.369011 env[1742]: 2024-07-02 00:46:26.334 [INFO][4452] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Namespace="kube-system" Pod="coredns-76f75df574-dxtzw" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"a93f21e7-f908-46d5-a047-059eb88e2cef", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf", Pod:"coredns-76f75df574-dxtzw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.91.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali55bdbf94470", MAC:"7a:c0:ea:cb:df:f3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:26.369011 env[1742]: 2024-07-02 00:46:26.362 [INFO][4452] k8s.go 500: Wrote updated endpoint to datastore ContainerID="4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf" Namespace="kube-system" Pod="coredns-76f75df574-dxtzw" WorkloadEndpoint="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:26.394100 env[1742]: time="2024-07-02T00:46:26.393967509Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:46:26.394302 env[1742]: time="2024-07-02T00:46:26.394119017Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:46:26.394302 env[1742]: time="2024-07-02T00:46:26.394182094Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:46:26.394585 env[1742]: time="2024-07-02T00:46:26.394468179Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf pid=4498 runtime=io.containerd.runc.v2 Jul 2 00:46:26.409000 audit[4505]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4505 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:46:26.409000 audit[4505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=ffffdba73760 a2=0 a3=ffff9fe2dfa8 items=0 ppid=3796 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.409000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:46:26.470495 systemd[1]: Started cri-containerd-4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf.scope. Jul 2 00:46:26.493835 systemd[1]: run-containerd-runc-k8s.io-4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf-runc.jDwSaY.mount: Deactivated successfully. Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.529000 audit: BPF prog-id=162 op=LOAD Jul 2 00:46:26.530000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.530000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4498 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383130633033323239346639633366316236353637626464346436 Jul 2 00:46:26.531000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.531000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4498 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383130633033323239346639633366316236353637626464346436 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.532000 audit: BPF prog-id=163 op=LOAD Jul 2 00:46:26.532000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4498 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383130633033323239346639633366316236353637626464346436 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit: BPF prog-id=164 op=LOAD Jul 2 00:46:26.534000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4498 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383130633033323239346639633366316236353637626464346436 Jul 2 00:46:26.534000 audit: BPF prog-id=164 op=UNLOAD Jul 2 00:46:26.534000 audit: BPF prog-id=163 op=UNLOAD Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.534000 audit: BPF prog-id=165 op=LOAD Jul 2 00:46:26.534000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4498 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383130633033323239346639633366316236353637626464346436 Jul 2 00:46:26.585135 env[1742]: time="2024-07-02T00:46:26.580749233Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-dxtzw,Uid:a93f21e7-f908-46d5-a047-059eb88e2cef,Namespace:kube-system,Attempt:1,} returns sandbox id \"4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf\"" Jul 2 00:46:26.591229 env[1742]: time="2024-07-02T00:46:26.591170686Z" level=info msg="CreateContainer within sandbox \"4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 00:46:26.636087 env[1742]: time="2024-07-02T00:46:26.631016652Z" level=info msg="CreateContainer within sandbox \"4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"45ab0d99b3ccd2fc4783fb780e3b6159a1eb1f6e4cdf573f614437f2631f8c8c\"" Jul 2 00:46:26.636087 env[1742]: time="2024-07-02T00:46:26.632089096Z" level=info msg="StartContainer for \"45ab0d99b3ccd2fc4783fb780e3b6159a1eb1f6e4cdf573f614437f2631f8c8c\"" Jul 2 00:46:26.676014 systemd[1]: Started cri-containerd-45ab0d99b3ccd2fc4783fb780e3b6159a1eb1f6e4cdf573f614437f2631f8c8c.scope. Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.730000 audit: BPF prog-id=166 op=LOAD Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4498 pid=4540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616230643939623363636432666334373833666237383065336236 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4498 pid=4540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616230643939623363636432666334373833666237383065336236 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit: BPF prog-id=167 op=LOAD Jul 2 00:46:26.732000 audit[4540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4498 pid=4540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616230643939623363636432666334373833666237383065336236 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit: BPF prog-id=168 op=LOAD Jul 2 00:46:26.732000 audit[4540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4498 pid=4540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616230643939623363636432666334373833666237383065336236 Jul 2 00:46:26.732000 audit: BPF prog-id=168 op=UNLOAD Jul 2 00:46:26.732000 audit: BPF prog-id=167 op=UNLOAD Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { perfmon } for pid=4540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit[4540]: AVC avc: denied { bpf } for pid=4540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:26.732000 audit: BPF prog-id=169 op=LOAD Jul 2 00:46:26.732000 audit[4540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4498 pid=4540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:26.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616230643939623363636432666334373833666237383065336236 Jul 2 00:46:26.790756 env[1742]: time="2024-07-02T00:46:26.790683398Z" level=info msg="StartContainer for \"45ab0d99b3ccd2fc4783fb780e3b6159a1eb1f6e4cdf573f614437f2631f8c8c\" returns successfully" Jul 2 00:46:27.214637 kubelet[2820]: I0702 00:46:27.214574 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-dxtzw" podStartSLOduration=39.214491354 podStartE2EDuration="39.214491354s" podCreationTimestamp="2024-07-02 00:45:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:46:27.213929727 +0000 UTC m=+51.631544421" watchObservedRunningTime="2024-07-02 00:46:27.214491354 +0000 UTC m=+51.632106024" Jul 2 00:46:27.283000 audit[4572]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:27.283000 audit[4572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd0a56d10 a2=0 a3=1 items=0 ppid=2962 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:27.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:27.287000 audit[4572]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:27.287000 audit[4572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffd0a56d10 a2=0 a3=1 items=0 ppid=2962 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:27.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:27.345673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount976769903.mount: Deactivated successfully. Jul 2 00:46:27.826753 systemd-networkd[1461]: cali55bdbf94470: Gained IPv6LL Jul 2 00:46:28.574314 kernel: kauditd_printk_skb: 416 callbacks suppressed Jul 2 00:46:28.574562 kernel: audit: type=1325 audit(1719881188.566:1147): table=filter:111 family=2 entries=8 op=nft_register_rule pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:28.566000 audit[4574]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:28.584927 kernel: audit: type=1300 audit(1719881188.566:1147): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd6c8f900 a2=0 a3=1 items=0 ppid=2962 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:28.566000 audit[4574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd6c8f900 a2=0 a3=1 items=0 ppid=2962 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:28.607415 kernel: audit: type=1327 audit(1719881188.566:1147): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:28.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:28.672360 kernel: audit: type=1325 audit(1719881188.601:1148): table=nat:112 family=2 entries=56 op=nft_register_chain pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:28.672614 kernel: audit: type=1300 audit(1719881188.601:1148): arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffd6c8f900 a2=0 a3=1 items=0 ppid=2962 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:28.601000 audit[4574]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:28.601000 audit[4574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffd6c8f900 a2=0 a3=1 items=0 ppid=2962 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:28.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:28.687500 kernel: audit: type=1327 audit(1719881188.601:1148): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:29.032253 env[1742]: time="2024-07-02T00:46:29.032183534Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:29.037315 env[1742]: time="2024-07-02T00:46:29.037246365Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:29.041676 env[1742]: time="2024-07-02T00:46:29.041603912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:29.046021 env[1742]: time="2024-07-02T00:46:29.045942381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:29.047341 env[1742]: time="2024-07-02T00:46:29.047284770Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1\"" Jul 2 00:46:29.058559 env[1742]: time="2024-07-02T00:46:29.058485294Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 00:46:29.084404 env[1742]: time="2024-07-02T00:46:29.084172961Z" level=info msg="CreateContainer within sandbox \"bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 00:46:29.122581 env[1742]: time="2024-07-02T00:46:29.122495789Z" level=info msg="CreateContainer within sandbox \"bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85\"" Jul 2 00:46:29.123966 env[1742]: time="2024-07-02T00:46:29.123889366Z" level=info msg="StartContainer for \"4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85\"" Jul 2 00:46:29.198594 systemd[1]: Started cri-containerd-4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85.scope. Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.321982 kernel: audit: type=1400 audit(1719881189.308:1149): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.322126 kernel: audit: type=1400 audit(1719881189.308:1150): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.333384 kernel: audit: type=1400 audit(1719881189.308:1151): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.341726 kernel: audit: type=1400 audit(1719881189.308:1152): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.314000 audit: BPF prog-id=170 op=LOAD Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4304 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353766353232346633653431396363616465626332363835306563 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4304 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353766353232346633653431396363616465626332363835306563 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit: BPF prog-id=171 op=LOAD Jul 2 00:46:29.323000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4304 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353766353232346633653431396363616465626332363835306563 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.323000 audit: BPF prog-id=172 op=LOAD Jul 2 00:46:29.323000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4304 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353766353232346633653431396363616465626332363835306563 Jul 2 00:46:29.324000 audit: BPF prog-id=172 op=UNLOAD Jul 2 00:46:29.324000 audit: BPF prog-id=171 op=UNLOAD Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:29.324000 audit: BPF prog-id=173 op=LOAD Jul 2 00:46:29.324000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4304 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:29.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353766353232346633653431396363616465626332363835306563 Jul 2 00:46:29.401283 env[1742]: time="2024-07-02T00:46:29.401219122Z" level=info msg="StartContainer for \"4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85\" returns successfully" Jul 2 00:46:29.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.140:22-139.178.89.65:51558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:29.470325 systemd[1]: Started sshd@8-172.31.27.140:22-139.178.89.65:51558.service. Jul 2 00:46:29.677891 sshd[4616]: Accepted publickey for core from 139.178.89.65 port 51558 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:29.677000 audit[4616]: USER_ACCT pid=4616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:29.681000 audit[4616]: CRED_ACQ pid=4616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:29.681000 audit[4616]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1dfe730 a2=3 a3=1 items=0 ppid=1 pid=4616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:29.681000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:29.683080 sshd[4616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:29.693629 systemd-logind[1733]: New session 9 of user core. Jul 2 00:46:29.695573 systemd[1]: Started session-9.scope. Jul 2 00:46:29.709000 audit[4616]: USER_START pid=4616 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:29.712000 audit[4620]: CRED_ACQ pid=4620 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:30.005831 sshd[4616]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:30.008000 audit[4616]: USER_END pid=4616 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:30.008000 audit[4616]: CRED_DISP pid=4616 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:30.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.140:22-139.178.89.65:51558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.013066 systemd[1]: sshd@8-172.31.27.140:22-139.178.89.65:51558.service: Deactivated successfully. Jul 2 00:46:30.014563 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 00:46:30.016160 systemd-logind[1733]: Session 9 logged out. Waiting for processes to exit. Jul 2 00:46:30.019562 systemd-logind[1733]: Removed session 9. Jul 2 00:46:30.066188 systemd[1]: run-containerd-runc-k8s.io-4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85-runc.c2j3ba.mount: Deactivated successfully. Jul 2 00:46:30.286190 systemd[1]: run-containerd-runc-k8s.io-4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85-runc.N4bzCV.mount: Deactivated successfully. Jul 2 00:46:30.389573 kubelet[2820]: I0702 00:46:30.389513 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-58c587f574-9nlll" podStartSLOduration=30.788018672 podStartE2EDuration="34.389432135s" podCreationTimestamp="2024-07-02 00:45:56 +0000 UTC" firstStartedPulling="2024-07-02 00:46:25.447756852 +0000 UTC m=+49.865371534" lastFinishedPulling="2024-07-02 00:46:29.049170327 +0000 UTC m=+53.466784997" observedRunningTime="2024-07-02 00:46:30.255076883 +0000 UTC m=+54.672691565" watchObservedRunningTime="2024-07-02 00:46:30.389432135 +0000 UTC m=+54.807046805" Jul 2 00:46:31.066000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:31.066000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:31.066000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001c09590 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:46:31.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:46:31.066000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001998ea0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:46:31.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:46:31.088000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:31.089000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:31.089000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4009d9a9a0 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:46:31.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:46:31.091000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:31.088000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007011bf0 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:46:31.088000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:46:31.091000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400712da40 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:46:31.091000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:46:31.115000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:31.115000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007356390 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:46:31.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:46:31.116000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:31.116000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40073565a0 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:46:31.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:46:31.117000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:31.117000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4009d9b280 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:46:31.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:46:31.631329 env[1742]: time="2024-07-02T00:46:31.631247724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:31.636527 env[1742]: time="2024-07-02T00:46:31.636439140Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:31.640923 env[1742]: time="2024-07-02T00:46:31.640841392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:31.645184 env[1742]: time="2024-07-02T00:46:31.645113827Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:31.647918 env[1742]: time="2024-07-02T00:46:31.646716093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28\"" Jul 2 00:46:31.672555 env[1742]: time="2024-07-02T00:46:31.672476246Z" level=info msg="CreateContainer within sandbox \"5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 00:46:31.705714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3720608777.mount: Deactivated successfully. Jul 2 00:46:31.713696 env[1742]: time="2024-07-02T00:46:31.713273342Z" level=info msg="CreateContainer within sandbox \"5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"487dfe155e1a3f38c63b106f8d275cbc6466c5c30b233616ec4544a8f910181d\"" Jul 2 00:46:31.716015 env[1742]: time="2024-07-02T00:46:31.714256170Z" level=info msg="StartContainer for \"487dfe155e1a3f38c63b106f8d275cbc6466c5c30b233616ec4544a8f910181d\"" Jul 2 00:46:31.798594 systemd[1]: Started cri-containerd-487dfe155e1a3f38c63b106f8d275cbc6466c5c30b233616ec4544a8f910181d.scope. Jul 2 00:46:31.859000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.859000 audit[4667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4093 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:31.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376466653135356531613366333863363362313036663864323735 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit: BPF prog-id=174 op=LOAD Jul 2 00:46:31.860000 audit[4667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4093 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:31.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376466653135356531613366333863363362313036663864323735 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.860000 audit: BPF prog-id=175 op=LOAD Jul 2 00:46:31.860000 audit[4667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4093 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:31.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376466653135356531613366333863363362313036663864323735 Jul 2 00:46:31.861000 audit: BPF prog-id=175 op=UNLOAD Jul 2 00:46:31.861000 audit: BPF prog-id=174 op=UNLOAD Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:31.861000 audit: BPF prog-id=176 op=LOAD Jul 2 00:46:31.861000 audit[4667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4093 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:31.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376466653135356531613366333863363362313036663864323735 Jul 2 00:46:31.912590 env[1742]: time="2024-07-02T00:46:31.912402156Z" level=info msg="StartContainer for \"487dfe155e1a3f38c63b106f8d275cbc6466c5c30b233616ec4544a8f910181d\" returns successfully" Jul 2 00:46:32.222222 kubelet[2820]: I0702 00:46:32.222159 2820 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 00:46:32.222958 kubelet[2820]: I0702 00:46:32.222236 2820 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 00:46:32.694460 systemd[1]: run-containerd-runc-k8s.io-487dfe155e1a3f38c63b106f8d275cbc6466c5c30b233616ec4544a8f910181d-runc.5ot5iI.mount: Deactivated successfully. Jul 2 00:46:35.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.140:22-139.178.89.65:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:35.035743 systemd[1]: Started sshd@9-172.31.27.140:22-139.178.89.65:51562.service. Jul 2 00:46:35.038181 kernel: kauditd_printk_skb: 131 callbacks suppressed Jul 2 00:46:35.038260 kernel: audit: type=1130 audit(1719881195.034:1190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.140:22-139.178.89.65:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:35.218000 audit[4697]: USER_ACCT pid=4697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.222705 sshd[4697]: Accepted publickey for core from 139.178.89.65 port 51562 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:35.229683 kernel: audit: type=1101 audit(1719881195.218:1191): pid=4697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.229000 audit[4697]: CRED_ACQ pid=4697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.232580 sshd[4697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:35.244706 kernel: audit: type=1103 audit(1719881195.229:1192): pid=4697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.244929 kernel: audit: type=1006 audit(1719881195.230:1193): pid=4697 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 00:46:35.230000 audit[4697]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5c150d0 a2=3 a3=1 items=0 ppid=1 pid=4697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:35.254334 kernel: audit: type=1300 audit(1719881195.230:1193): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5c150d0 a2=3 a3=1 items=0 ppid=1 pid=4697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:35.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:35.258340 kernel: audit: type=1327 audit(1719881195.230:1193): proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:35.263551 systemd[1]: Started session-10.scope. Jul 2 00:46:35.265217 systemd-logind[1733]: New session 10 of user core. Jul 2 00:46:35.273000 audit[4697]: USER_START pid=4697 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.276000 audit[4699]: CRED_ACQ pid=4699 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.292873 kernel: audit: type=1105 audit(1719881195.273:1194): pid=4697 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.292983 kernel: audit: type=1103 audit(1719881195.276:1195): pid=4699 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.530958 sshd[4697]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:35.532000 audit[4697]: USER_END pid=4697 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.536940 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 00:46:35.538361 systemd[1]: sshd@9-172.31.27.140:22-139.178.89.65:51562.service: Deactivated successfully. Jul 2 00:46:35.533000 audit[4697]: CRED_DISP pid=4697 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.544579 kernel: audit: type=1106 audit(1719881195.532:1196): pid=4697 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.140:22-139.178.89.65:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:35.553292 systemd-logind[1733]: Session 10 logged out. Waiting for processes to exit. Jul 2 00:46:35.553993 kernel: audit: type=1104 audit(1719881195.533:1197): pid=4697 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:35.555544 systemd-logind[1733]: Removed session 10. Jul 2 00:46:35.867852 env[1742]: time="2024-07-02T00:46:35.865681652Z" level=info msg="StopPodSandbox for \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\"" Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:35.957 [WARNING][4722] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0", GenerateName:"calico-kube-controllers-58c587f574-", Namespace:"calico-system", SelfLink:"", UID:"77199baa-a7b6-49ca-9178-fe177bd5d53a", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58c587f574", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f", Pod:"calico-kube-controllers-58c587f574-9nlll", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.91.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid47c8735877", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:35.958 [INFO][4722] k8s.go 608: Cleaning up netns ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:35.958 [INFO][4722] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" iface="eth0" netns="" Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:35.958 [INFO][4722] k8s.go 615: Releasing IP address(es) ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:35.958 [INFO][4722] utils.go 188: Calico CNI releasing IP address ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:35.994 [INFO][4729] ipam_plugin.go 411: Releasing address using handleID ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:35.994 [INFO][4729] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:35.994 [INFO][4729] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:36.006 [WARNING][4729] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:36.006 [INFO][4729] ipam_plugin.go 439: Releasing address using workloadID ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:36.009 [INFO][4729] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:36.014398 env[1742]: 2024-07-02 00:46:36.011 [INFO][4722] k8s.go 621: Teardown processing complete. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:36.015818 env[1742]: time="2024-07-02T00:46:36.015572303Z" level=info msg="TearDown network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\" successfully" Jul 2 00:46:36.015818 env[1742]: time="2024-07-02T00:46:36.015625760Z" level=info msg="StopPodSandbox for \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\" returns successfully" Jul 2 00:46:36.016706 env[1742]: time="2024-07-02T00:46:36.016655192Z" level=info msg="RemovePodSandbox for \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\"" Jul 2 00:46:36.016850 env[1742]: time="2024-07-02T00:46:36.016716581Z" level=info msg="Forcibly stopping sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\"" Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.088 [WARNING][4748] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0", GenerateName:"calico-kube-controllers-58c587f574-", Namespace:"calico-system", SelfLink:"", UID:"77199baa-a7b6-49ca-9178-fe177bd5d53a", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58c587f574", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"bfeeabb9d05bfcc374ed4a1cfa2d1284b88f0be6f28eb603f533b46bd580af8f", Pod:"calico-kube-controllers-58c587f574-9nlll", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.91.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid47c8735877", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.088 [INFO][4748] k8s.go 608: Cleaning up netns ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.088 [INFO][4748] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" iface="eth0" netns="" Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.088 [INFO][4748] k8s.go 615: Releasing IP address(es) ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.089 [INFO][4748] utils.go 188: Calico CNI releasing IP address ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.141 [INFO][4754] ipam_plugin.go 411: Releasing address using handleID ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.142 [INFO][4754] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.142 [INFO][4754] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.154 [WARNING][4754] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.154 [INFO][4754] ipam_plugin.go 439: Releasing address using workloadID ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" HandleID="k8s-pod-network.3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Workload="ip--172--31--27--140-k8s-calico--kube--controllers--58c587f574--9nlll-eth0" Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.156 [INFO][4754] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:36.161794 env[1742]: 2024-07-02 00:46:36.158 [INFO][4748] k8s.go 621: Teardown processing complete. ContainerID="3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80" Jul 2 00:46:36.163297 env[1742]: time="2024-07-02T00:46:36.161752044Z" level=info msg="TearDown network for sandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\" successfully" Jul 2 00:46:36.168506 env[1742]: time="2024-07-02T00:46:36.168408299Z" level=info msg="RemovePodSandbox \"3b51eafe684fa712930d61e60d3ef9f7a46f29ba7d2a1b45c87aaca6590b9b80\" returns successfully" Jul 2 00:46:36.169640 env[1742]: time="2024-07-02T00:46:36.169549421Z" level=info msg="StopPodSandbox for \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\"" Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.271 [WARNING][4774] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"a93f21e7-f908-46d5-a047-059eb88e2cef", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf", Pod:"coredns-76f75df574-dxtzw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.91.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali55bdbf94470", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.271 [INFO][4774] k8s.go 608: Cleaning up netns ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.271 [INFO][4774] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" iface="eth0" netns="" Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.271 [INFO][4774] k8s.go 615: Releasing IP address(es) ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.272 [INFO][4774] utils.go 188: Calico CNI releasing IP address ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.312 [INFO][4780] ipam_plugin.go 411: Releasing address using handleID ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.312 [INFO][4780] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.313 [INFO][4780] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.324 [WARNING][4780] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.325 [INFO][4780] ipam_plugin.go 439: Releasing address using workloadID ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.327 [INFO][4780] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:36.331937 env[1742]: 2024-07-02 00:46:36.329 [INFO][4774] k8s.go 621: Teardown processing complete. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:36.333074 env[1742]: time="2024-07-02T00:46:36.333020940Z" level=info msg="TearDown network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\" successfully" Jul 2 00:46:36.333203 env[1742]: time="2024-07-02T00:46:36.333171112Z" level=info msg="StopPodSandbox for \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\" returns successfully" Jul 2 00:46:36.334086 env[1742]: time="2024-07-02T00:46:36.334041133Z" level=info msg="RemovePodSandbox for \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\"" Jul 2 00:46:36.334371 env[1742]: time="2024-07-02T00:46:36.334310265Z" level=info msg="Forcibly stopping sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\"" Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.403 [WARNING][4798] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"a93f21e7-f908-46d5-a047-059eb88e2cef", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"4c810c032294f9c3f1b6567bdd4d61954e80473b481fb8ca4ab3666e28a17ebf", Pod:"coredns-76f75df574-dxtzw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.91.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali55bdbf94470", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.404 [INFO][4798] k8s.go 608: Cleaning up netns ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.404 [INFO][4798] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" iface="eth0" netns="" Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.404 [INFO][4798] k8s.go 615: Releasing IP address(es) ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.404 [INFO][4798] utils.go 188: Calico CNI releasing IP address ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.440 [INFO][4804] ipam_plugin.go 411: Releasing address using handleID ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.441 [INFO][4804] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.441 [INFO][4804] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.455 [WARNING][4804] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.455 [INFO][4804] ipam_plugin.go 439: Releasing address using workloadID ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" HandleID="k8s-pod-network.72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--dxtzw-eth0" Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.457 [INFO][4804] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:36.462324 env[1742]: 2024-07-02 00:46:36.460 [INFO][4798] k8s.go 621: Teardown processing complete. ContainerID="72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033" Jul 2 00:46:36.464337 env[1742]: time="2024-07-02T00:46:36.464284394Z" level=info msg="TearDown network for sandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\" successfully" Jul 2 00:46:36.473861 env[1742]: time="2024-07-02T00:46:36.473794803Z" level=info msg="RemovePodSandbox \"72e5cb50c9269fdc7419731927ff719bc66e0375ba48760770ae1c7212f0b033\" returns successfully" Jul 2 00:46:36.474828 env[1742]: time="2024-07-02T00:46:36.474781098Z" level=info msg="StopPodSandbox for \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\"" Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.545 [WARNING][4824] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7", Pod:"csi-node-driver-7wf2w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0befb1c6c95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.546 [INFO][4824] k8s.go 608: Cleaning up netns ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.546 [INFO][4824] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" iface="eth0" netns="" Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.546 [INFO][4824] k8s.go 615: Releasing IP address(es) ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.546 [INFO][4824] utils.go 188: Calico CNI releasing IP address ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.633 [INFO][4831] ipam_plugin.go 411: Releasing address using handleID ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.634 [INFO][4831] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.635 [INFO][4831] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.648 [WARNING][4831] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.648 [INFO][4831] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.653 [INFO][4831] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:36.660859 env[1742]: 2024-07-02 00:46:36.658 [INFO][4824] k8s.go 621: Teardown processing complete. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:36.661884 env[1742]: time="2024-07-02T00:46:36.660953046Z" level=info msg="TearDown network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\" successfully" Jul 2 00:46:36.661884 env[1742]: time="2024-07-02T00:46:36.661000551Z" level=info msg="StopPodSandbox for \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\" returns successfully" Jul 2 00:46:36.661884 env[1742]: time="2024-07-02T00:46:36.661734033Z" level=info msg="RemovePodSandbox for \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\"" Jul 2 00:46:36.662089 env[1742]: time="2024-07-02T00:46:36.661788282Z" level=info msg="Forcibly stopping sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\"" Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.727 [WARNING][4850] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"14f15b9d-f3a9-4a23-9fb1-cf5a71e677b7", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"5ff52f3329e8815c9ff25fd09480402427835fd45213ee41ea86c2cf9d9f2ea7", Pod:"csi-node-driver-7wf2w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0befb1c6c95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.727 [INFO][4850] k8s.go 608: Cleaning up netns ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.727 [INFO][4850] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" iface="eth0" netns="" Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.727 [INFO][4850] k8s.go 615: Releasing IP address(es) ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.728 [INFO][4850] utils.go 188: Calico CNI releasing IP address ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.775 [INFO][4858] ipam_plugin.go 411: Releasing address using handleID ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.776 [INFO][4858] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.776 [INFO][4858] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.788 [WARNING][4858] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.788 [INFO][4858] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" HandleID="k8s-pod-network.e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Workload="ip--172--31--27--140-k8s-csi--node--driver--7wf2w-eth0" Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.790 [INFO][4858] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:36.795591 env[1742]: 2024-07-02 00:46:36.793 [INFO][4850] k8s.go 621: Teardown processing complete. ContainerID="e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3" Jul 2 00:46:36.796563 env[1742]: time="2024-07-02T00:46:36.795642289Z" level=info msg="TearDown network for sandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\" successfully" Jul 2 00:46:36.800653 env[1742]: time="2024-07-02T00:46:36.800586699Z" level=info msg="RemovePodSandbox \"e3fc8a7b7440c86f5367d3cb2076c4cbc5de2ba0238976a9612b68c4fde6d2b3\" returns successfully" Jul 2 00:46:36.801635 env[1742]: time="2024-07-02T00:46:36.801580001Z" level=info msg="StopPodSandbox for \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\"" Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.883 [WARNING][4876] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"56006743-e6f3-442c-ab85-00249bd3fe78", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515", Pod:"coredns-76f75df574-72vtd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.91.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3f4e9410b45", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.883 [INFO][4876] k8s.go 608: Cleaning up netns ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.884 [INFO][4876] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" iface="eth0" netns="" Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.884 [INFO][4876] k8s.go 615: Releasing IP address(es) ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.884 [INFO][4876] utils.go 188: Calico CNI releasing IP address ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.924 [INFO][4883] ipam_plugin.go 411: Releasing address using handleID ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.926 [INFO][4883] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.927 [INFO][4883] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.939 [WARNING][4883] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.939 [INFO][4883] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.941 [INFO][4883] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:36.947180 env[1742]: 2024-07-02 00:46:36.944 [INFO][4876] k8s.go 621: Teardown processing complete. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:36.948646 env[1742]: time="2024-07-02T00:46:36.947221922Z" level=info msg="TearDown network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\" successfully" Jul 2 00:46:36.948646 env[1742]: time="2024-07-02T00:46:36.947267867Z" level=info msg="StopPodSandbox for \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\" returns successfully" Jul 2 00:46:36.949075 env[1742]: time="2024-07-02T00:46:36.949029521Z" level=info msg="RemovePodSandbox for \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\"" Jul 2 00:46:36.949331 env[1742]: time="2024-07-02T00:46:36.949257940Z" level=info msg="Forcibly stopping sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\"" Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.013 [WARNING][4902] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"56006743-e6f3-442c-ab85-00249bd3fe78", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 45, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"75ad1cf81b5aafde91b8550c9e8f4e12216d7bfaff39a5cd71eadc859eced515", Pod:"coredns-76f75df574-72vtd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.91.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3f4e9410b45", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.014 [INFO][4902] k8s.go 608: Cleaning up netns ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.014 [INFO][4902] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" iface="eth0" netns="" Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.014 [INFO][4902] k8s.go 615: Releasing IP address(es) ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.014 [INFO][4902] utils.go 188: Calico CNI releasing IP address ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.049 [INFO][4909] ipam_plugin.go 411: Releasing address using handleID ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.049 [INFO][4909] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.049 [INFO][4909] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.062 [WARNING][4909] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.062 [INFO][4909] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" HandleID="k8s-pod-network.a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Workload="ip--172--31--27--140-k8s-coredns--76f75df574--72vtd-eth0" Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.064 [INFO][4909] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:46:37.068823 env[1742]: 2024-07-02 00:46:37.066 [INFO][4902] k8s.go 621: Teardown processing complete. ContainerID="a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325" Jul 2 00:46:37.070899 env[1742]: time="2024-07-02T00:46:37.070847088Z" level=info msg="TearDown network for sandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\" successfully" Jul 2 00:46:37.076701 env[1742]: time="2024-07-02T00:46:37.076623853Z" level=info msg="RemovePodSandbox \"a575c7a9e26b8bfe54e0df21e0aafab2f988f3cc784e4d0e853b21fcb9517325\" returns successfully" Jul 2 00:46:40.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.140:22-139.178.89.65:49534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:40.562195 systemd[1]: Started sshd@10-172.31.27.140:22-139.178.89.65:49534.service. Jul 2 00:46:40.565343 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 00:46:40.565415 kernel: audit: type=1130 audit(1719881200.561:1199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.140:22-139.178.89.65:49534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:40.739000 audit[4947]: USER_ACCT pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:40.741822 sshd[4947]: Accepted publickey for core from 139.178.89.65 port 49534 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:40.751516 kernel: audit: type=1101 audit(1719881200.739:1200): pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:40.750000 audit[4947]: CRED_ACQ pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:40.761287 sshd[4947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:40.766811 kernel: audit: type=1103 audit(1719881200.750:1201): pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:40.766905 kernel: audit: type=1006 audit(1719881200.750:1202): pid=4947 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 2 00:46:40.750000 audit[4947]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc9baba0 a2=3 a3=1 items=0 ppid=1 pid=4947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:40.776106 kernel: audit: type=1300 audit(1719881200.750:1202): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc9baba0 a2=3 a3=1 items=0 ppid=1 pid=4947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:40.776529 kernel: audit: type=1327 audit(1719881200.750:1202): proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:40.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:40.786759 systemd[1]: Started session-11.scope. Jul 2 00:46:40.786839 systemd-logind[1733]: New session 11 of user core. Jul 2 00:46:40.796000 audit[4947]: USER_START pid=4947 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:40.809969 kernel: audit: type=1105 audit(1719881200.796:1203): pid=4947 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:40.810121 kernel: audit: type=1103 audit(1719881200.807:1204): pid=4949 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:40.807000 audit[4949]: CRED_ACQ pid=4949 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.052930 sshd[4947]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:41.054000 audit[4947]: USER_END pid=4947 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.059781 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 00:46:41.061171 systemd[1]: sshd@10-172.31.27.140:22-139.178.89.65:49534.service: Deactivated successfully. Jul 2 00:46:41.066726 systemd-logind[1733]: Session 11 logged out. Waiting for processes to exit. Jul 2 00:46:41.057000 audit[4947]: CRED_DISP pid=4947 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.075437 kernel: audit: type=1106 audit(1719881201.054:1205): pid=4947 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.075577 kernel: audit: type=1104 audit(1719881201.057:1206): pid=4947 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.140:22-139.178.89.65:49534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:41.076471 systemd-logind[1733]: Removed session 11. Jul 2 00:46:41.085352 systemd[1]: Started sshd@11-172.31.27.140:22-139.178.89.65:49536.service. Jul 2 00:46:41.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.140:22-139.178.89.65:49536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:41.257000 audit[4960]: USER_ACCT pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.258382 sshd[4960]: Accepted publickey for core from 139.178.89.65 port 49536 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:41.259000 audit[4960]: CRED_ACQ pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.260000 audit[4960]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb75a860 a2=3 a3=1 items=0 ppid=1 pid=4960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:41.260000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:41.261587 sshd[4960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:41.270594 systemd-logind[1733]: New session 12 of user core. Jul 2 00:46:41.270954 systemd[1]: Started session-12.scope. Jul 2 00:46:41.280000 audit[4960]: USER_START pid=4960 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.284000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.590627 sshd[4960]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:41.592000 audit[4960]: USER_END pid=4960 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.592000 audit[4960]: CRED_DISP pid=4960 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.140:22-139.178.89.65:49536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:41.595761 systemd[1]: sshd@11-172.31.27.140:22-139.178.89.65:49536.service: Deactivated successfully. Jul 2 00:46:41.597182 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 00:46:41.599976 systemd-logind[1733]: Session 12 logged out. Waiting for processes to exit. Jul 2 00:46:41.603033 systemd-logind[1733]: Removed session 12. Jul 2 00:46:41.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.140:22-139.178.89.65:49540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:41.627888 systemd[1]: Started sshd@12-172.31.27.140:22-139.178.89.65:49540.service. Jul 2 00:46:41.800000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.801746 sshd[4970]: Accepted publickey for core from 139.178.89.65 port 49540 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:41.803000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.803000 audit[4970]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff26709d0 a2=3 a3=1 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:41.803000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:41.804994 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:41.813716 systemd-logind[1733]: New session 13 of user core. Jul 2 00:46:41.813980 systemd[1]: Started session-13.scope. Jul 2 00:46:41.823000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:41.826000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:42.065521 sshd[4970]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:42.067000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:42.067000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:42.071476 systemd-logind[1733]: Session 13 logged out. Waiting for processes to exit. Jul 2 00:46:42.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.140:22-139.178.89.65:49540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.072210 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 00:46:42.073334 systemd[1]: sshd@12-172.31.27.140:22-139.178.89.65:49540.service: Deactivated successfully. Jul 2 00:46:42.077163 systemd-logind[1733]: Removed session 13. Jul 2 00:46:45.180000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:45.180000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029a7460 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:46:45.180000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:46:45.185000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:45.185000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a31460 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:46:45.185000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:46:45.186000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:45.186000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029a7600 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:46:45.186000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:46:45.188000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:46:45.188000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a31600 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:46:45.188000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:46:47.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.140:22-139.178.89.65:49546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:47.096731 systemd[1]: Started sshd@13-172.31.27.140:22-139.178.89.65:49546.service. Jul 2 00:46:47.099401 kernel: kauditd_printk_skb: 35 callbacks suppressed Jul 2 00:46:47.099500 kernel: audit: type=1130 audit(1719881207.097:1230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.140:22-139.178.89.65:49546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:47.267000 audit[4983]: USER_ACCT pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.271242 sshd[4983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:47.278943 sshd[4983]: Accepted publickey for core from 139.178.89.65 port 49546 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:47.269000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.290416 kernel: audit: type=1101 audit(1719881207.267:1231): pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.290566 kernel: audit: type=1103 audit(1719881207.269:1232): pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.300421 kernel: audit: type=1006 audit(1719881207.269:1233): pid=4983 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 2 00:46:47.298304 systemd[1]: Started session-14.scope. Jul 2 00:46:47.299608 systemd-logind[1733]: New session 14 of user core. Jul 2 00:46:47.269000 audit[4983]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9f3cf40 a2=3 a3=1 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:47.316910 kernel: audit: type=1300 audit(1719881207.269:1233): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9f3cf40 a2=3 a3=1 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.317061 kernel: audit: type=1327 audit(1719881207.269:1233): proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:47.324000 audit[4983]: USER_START pid=4983 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.337000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.346062 kernel: audit: type=1105 audit(1719881207.324:1234): pid=4983 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.346225 kernel: audit: type=1103 audit(1719881207.337:1235): pid=4986 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.626724 sshd[4983]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:47.629000 audit[4983]: USER_END pid=4983 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.632425 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 00:46:47.634071 systemd[1]: sshd@13-172.31.27.140:22-139.178.89.65:49546.service: Deactivated successfully. Jul 2 00:46:47.629000 audit[4983]: CRED_DISP pid=4983 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.648336 kernel: audit: type=1106 audit(1719881207.629:1236): pid=4983 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.648514 kernel: audit: type=1104 audit(1719881207.629:1237): pid=4983 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.648420 systemd-logind[1733]: Session 14 logged out. Waiting for processes to exit. Jul 2 00:46:47.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.140:22-139.178.89.65:49546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:47.650234 systemd-logind[1733]: Removed session 14. Jul 2 00:46:49.855051 systemd[1]: run-containerd-runc-k8s.io-131fedf3c0db9fc67e32150ab124f5d57a9408a6d12c967dead943c44f1b6b01-runc.wH9YAQ.mount: Deactivated successfully. Jul 2 00:46:52.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.140:22-139.178.89.65:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:52.655133 systemd[1]: Started sshd@14-172.31.27.140:22-139.178.89.65:41330.service. Jul 2 00:46:52.657250 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 00:46:52.658420 kernel: audit: type=1130 audit(1719881212.655:1239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.140:22-139.178.89.65:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:52.831000 audit[5028]: USER_ACCT pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:52.837605 sshd[5028]: Accepted publickey for core from 139.178.89.65 port 41330 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:52.837000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:52.841068 sshd[5028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:52.848807 kernel: audit: type=1101 audit(1719881212.831:1240): pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:52.849116 kernel: audit: type=1103 audit(1719881212.837:1241): pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:52.849184 kernel: audit: type=1006 audit(1719881212.837:1242): pid=5028 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 2 00:46:52.837000 audit[5028]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4e4ac00 a2=3 a3=1 items=0 ppid=1 pid=5028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.863945 kernel: audit: type=1300 audit(1719881212.837:1242): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4e4ac00 a2=3 a3=1 items=0 ppid=1 pid=5028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.864101 kernel: audit: type=1327 audit(1719881212.837:1242): proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:52.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:52.872897 systemd-logind[1733]: New session 15 of user core. Jul 2 00:46:52.874843 systemd[1]: Started session-15.scope. Jul 2 00:46:52.884000 audit[5028]: USER_START pid=5028 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:52.887000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:52.903644 kernel: audit: type=1105 audit(1719881212.884:1243): pid=5028 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:52.903750 kernel: audit: type=1103 audit(1719881212.887:1244): pid=5030 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:53.140934 sshd[5028]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:53.142000 audit[5028]: USER_END pid=5028 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:53.154047 systemd[1]: sshd@14-172.31.27.140:22-139.178.89.65:41330.service: Deactivated successfully. Jul 2 00:46:53.142000 audit[5028]: CRED_DISP pid=5028 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:53.163572 kernel: audit: type=1106 audit(1719881213.142:1245): pid=5028 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:53.163709 kernel: audit: type=1104 audit(1719881213.142:1246): pid=5028 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:53.155434 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 00:46:53.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.140:22-139.178.89.65:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:53.165096 systemd-logind[1733]: Session 15 logged out. Waiting for processes to exit. Jul 2 00:46:53.167107 systemd-logind[1733]: Removed session 15. Jul 2 00:46:58.171086 systemd[1]: Started sshd@15-172.31.27.140:22-139.178.89.65:48346.service. Jul 2 00:46:58.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.140:22-139.178.89.65:48346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:58.175384 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 00:46:58.175707 kernel: audit: type=1130 audit(1719881218.173:1248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.140:22-139.178.89.65:48346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:58.349339 sshd[5043]: Accepted publickey for core from 139.178.89.65 port 48346 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:58.348000 audit[5043]: USER_ACCT pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.359000 audit[5043]: CRED_ACQ pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.360999 sshd[5043]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:58.368140 kernel: audit: type=1101 audit(1719881218.348:1249): pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.368311 kernel: audit: type=1103 audit(1719881218.359:1250): pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.375523 kernel: audit: type=1006 audit(1719881218.359:1251): pid=5043 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 00:46:58.359000 audit[5043]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfaf3c10 a2=3 a3=1 items=0 ppid=1 pid=5043 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:58.386988 kernel: audit: type=1300 audit(1719881218.359:1251): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfaf3c10 a2=3 a3=1 items=0 ppid=1 pid=5043 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:58.359000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:58.391304 kernel: audit: type=1327 audit(1719881218.359:1251): proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:58.394084 systemd-logind[1733]: New session 16 of user core. Jul 2 00:46:58.395310 systemd[1]: Started session-16.scope. Jul 2 00:46:58.411000 audit[5043]: USER_START pid=5043 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.424226 kernel: audit: type=1105 audit(1719881218.411:1252): pid=5043 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.424396 kernel: audit: type=1103 audit(1719881218.423:1253): pid=5045 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.423000 audit[5045]: CRED_ACQ pid=5045 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.696503 sshd[5043]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:58.698000 audit[5043]: USER_END pid=5043 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.699000 audit[5043]: CRED_DISP pid=5043 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.713709 systemd[1]: sshd@15-172.31.27.140:22-139.178.89.65:48346.service: Deactivated successfully. Jul 2 00:46:58.714980 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 00:46:58.720212 kernel: audit: type=1106 audit(1719881218.698:1254): pid=5043 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.720344 kernel: audit: type=1104 audit(1719881218.699:1255): pid=5043 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:58.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.140:22-139.178.89.65:48346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:58.721817 systemd-logind[1733]: Session 16 logged out. Waiting for processes to exit. Jul 2 00:46:58.724372 systemd-logind[1733]: Removed session 16. Jul 2 00:47:01.920204 systemd[1]: run-containerd-runc-k8s.io-4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85-runc.RN6mJP.mount: Deactivated successfully. Jul 2 00:47:03.725597 systemd[1]: Started sshd@16-172.31.27.140:22-139.178.89.65:48362.service. Jul 2 00:47:03.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.140:22-139.178.89.65:48362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:03.728271 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 00:47:03.728400 kernel: audit: type=1130 audit(1719881223.725:1257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.140:22-139.178.89.65:48362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:03.898000 audit[5084]: USER_ACCT pid=5084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:03.899788 sshd[5084]: Accepted publickey for core from 139.178.89.65 port 48362 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:03.909000 audit[5084]: CRED_ACQ pid=5084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:03.911423 sshd[5084]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:03.918150 kernel: audit: type=1101 audit(1719881223.898:1258): pid=5084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:03.918310 kernel: audit: type=1103 audit(1719881223.909:1259): pid=5084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:03.918862 kernel: audit: type=1006 audit(1719881223.909:1260): pid=5084 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 00:47:03.909000 audit[5084]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff03001e0 a2=3 a3=1 items=0 ppid=1 pid=5084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:03.930615 systemd[1]: Started session-17.scope. Jul 2 00:47:03.932473 systemd-logind[1733]: New session 17 of user core. Jul 2 00:47:03.934212 kernel: audit: type=1300 audit(1719881223.909:1260): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff03001e0 a2=3 a3=1 items=0 ppid=1 pid=5084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:03.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:03.937539 kernel: audit: type=1327 audit(1719881223.909:1260): proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:03.945000 audit[5084]: USER_START pid=5084 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:03.955000 audit[5086]: CRED_ACQ pid=5086 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:03.963587 kernel: audit: type=1105 audit(1719881223.945:1261): pid=5084 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:03.963724 kernel: audit: type=1103 audit(1719881223.955:1262): pid=5086 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.206855 sshd[5084]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:04.209000 audit[5084]: USER_END pid=5084 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.212753 systemd[1]: sshd@16-172.31.27.140:22-139.178.89.65:48362.service: Deactivated successfully. Jul 2 00:47:04.214027 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 00:47:04.220546 kernel: audit: type=1106 audit(1719881224.209:1263): pid=5084 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.209000 audit[5084]: CRED_DISP pid=5084 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.229753 systemd-logind[1733]: Session 17 logged out. Waiting for processes to exit. Jul 2 00:47:04.232072 kernel: audit: type=1104 audit(1719881224.209:1264): pid=5084 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.140:22-139.178.89.65:48362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:04.241130 systemd[1]: Started sshd@17-172.31.27.140:22-139.178.89.65:48374.service. Jul 2 00:47:04.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.27.140:22-139.178.89.65:48374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:04.244157 systemd-logind[1733]: Removed session 17. Jul 2 00:47:04.417000 audit[5096]: USER_ACCT pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.418545 sshd[5096]: Accepted publickey for core from 139.178.89.65 port 48374 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:04.419000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.420000 audit[5096]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffccf9a970 a2=3 a3=1 items=0 ppid=1 pid=5096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:04.420000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:04.421711 sshd[5096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:04.429544 systemd-logind[1733]: New session 18 of user core. Jul 2 00:47:04.431428 systemd[1]: Started session-18.scope. Jul 2 00:47:04.440000 audit[5096]: USER_START pid=5096 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.443000 audit[5098]: CRED_ACQ pid=5098 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.867111 sshd[5096]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:04.869000 audit[5096]: USER_END pid=5096 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.870000 audit[5096]: CRED_DISP pid=5096 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:04.873265 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 00:47:04.874650 systemd-logind[1733]: Session 18 logged out. Waiting for processes to exit. Jul 2 00:47:04.875140 systemd[1]: sshd@17-172.31.27.140:22-139.178.89.65:48374.service: Deactivated successfully. Jul 2 00:47:04.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.27.140:22-139.178.89.65:48374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:04.877150 systemd-logind[1733]: Removed session 18. Jul 2 00:47:04.896509 systemd[1]: Started sshd@18-172.31.27.140:22-139.178.89.65:48376.service. Jul 2 00:47:04.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.27.140:22-139.178.89.65:48376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:05.076000 audit[5106]: USER_ACCT pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:05.077222 sshd[5106]: Accepted publickey for core from 139.178.89.65 port 48376 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:05.078000 audit[5106]: CRED_ACQ pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:05.079000 audit[5106]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8e28460 a2=3 a3=1 items=0 ppid=1 pid=5106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:05.079000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:05.080728 sshd[5106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:05.090229 systemd[1]: Started session-19.scope. Jul 2 00:47:05.091356 systemd-logind[1733]: New session 19 of user core. Jul 2 00:47:05.102000 audit[5106]: USER_START pid=5106 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:05.105000 audit[5108]: CRED_ACQ pid=5108 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:07.990795 sshd[5106]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:07.993000 audit[5106]: USER_END pid=5106 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:07.993000 audit[5106]: CRED_DISP pid=5106 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:07.997741 systemd[1]: sshd@18-172.31.27.140:22-139.178.89.65:48376.service: Deactivated successfully. Jul 2 00:47:07.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.27.140:22-139.178.89.65:48376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:07.999258 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 00:47:08.000357 systemd[1]: session-19.scope: Consumed 1.005s CPU time. Jul 2 00:47:08.001991 systemd-logind[1733]: Session 19 logged out. Waiting for processes to exit. Jul 2 00:47:08.004422 systemd-logind[1733]: Removed session 19. Jul 2 00:47:08.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.140:22-139.178.89.65:51902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:08.030785 systemd[1]: Started sshd@19-172.31.27.140:22-139.178.89.65:51902.service. Jul 2 00:47:08.059000 audit[5124]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:08.059000 audit[5124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd7c7bb20 a2=0 a3=1 items=0 ppid=2962 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:08.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:08.062000 audit[5124]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:08.062000 audit[5124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd7c7bb20 a2=0 a3=1 items=0 ppid=2962 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:08.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:08.080000 audit[5126]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=5126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:08.080000 audit[5126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd1d2efd0 a2=0 a3=1 items=0 ppid=2962 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:08.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:08.083000 audit[5126]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:08.083000 audit[5126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd1d2efd0 a2=0 a3=1 items=0 ppid=2962 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:08.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:08.200000 audit[5122]: USER_ACCT pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:08.201658 sshd[5122]: Accepted publickey for core from 139.178.89.65 port 51902 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:08.202000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:08.203000 audit[5122]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc921690 a2=3 a3=1 items=0 ppid=1 pid=5122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:08.203000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:08.204790 sshd[5122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:08.213167 systemd-logind[1733]: New session 20 of user core. Jul 2 00:47:08.214281 systemd[1]: Started session-20.scope. Jul 2 00:47:08.223000 audit[5122]: USER_START pid=5122 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:08.226000 audit[5127]: CRED_ACQ pid=5127 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:08.531637 systemd[1]: run-containerd-runc-k8s.io-4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85-runc.6FW1m1.mount: Deactivated successfully. Jul 2 00:47:08.803685 sshd[5122]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:08.807831 kernel: kauditd_printk_skb: 43 callbacks suppressed Jul 2 00:47:08.807991 kernel: audit: type=1106 audit(1719881228.805:1294): pid=5122 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:08.805000 audit[5122]: USER_END pid=5122 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:08.805000 audit[5122]: CRED_DISP pid=5122 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:08.818655 systemd[1]: sshd@19-172.31.27.140:22-139.178.89.65:51902.service: Deactivated successfully. Jul 2 00:47:08.826663 kernel: audit: type=1104 audit(1719881228.805:1295): pid=5122 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:08.819925 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 00:47:08.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.140:22-139.178.89.65:51902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:08.833529 systemd-logind[1733]: Session 20 logged out. Waiting for processes to exit. Jul 2 00:47:08.838886 kernel: audit: type=1131 audit(1719881228.818:1296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.140:22-139.178.89.65:51902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:08.846199 systemd[1]: Started sshd@20-172.31.27.140:22-139.178.89.65:51904.service. Jul 2 00:47:08.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.140:22-139.178.89.65:51904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:08.857415 systemd-logind[1733]: Removed session 20. Jul 2 00:47:08.864484 kernel: audit: type=1130 audit(1719881228.846:1297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.140:22-139.178.89.65:51904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:09.026000 audit[5155]: USER_ACCT pid=5155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.027419 sshd[5155]: Accepted publickey for core from 139.178.89.65 port 51904 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:09.030972 sshd[5155]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:09.029000 audit[5155]: CRED_ACQ pid=5155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.044677 kernel: audit: type=1101 audit(1719881229.026:1298): pid=5155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.044781 kernel: audit: type=1103 audit(1719881229.029:1299): pid=5155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.050084 kernel: audit: type=1006 audit(1719881229.029:1300): pid=5155 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jul 2 00:47:09.029000 audit[5155]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6c2e4d0 a2=3 a3=1 items=0 ppid=1 pid=5155 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:09.059220 kernel: audit: type=1300 audit(1719881229.029:1300): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6c2e4d0 a2=3 a3=1 items=0 ppid=1 pid=5155 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:09.029000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:09.062466 kernel: audit: type=1327 audit(1719881229.029:1300): proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:09.067897 systemd-logind[1733]: New session 21 of user core. Jul 2 00:47:09.069494 systemd[1]: Started session-21.scope. Jul 2 00:47:09.078000 audit[5155]: USER_START pid=5155 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.081000 audit[5157]: CRED_ACQ pid=5157 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.089551 kernel: audit: type=1105 audit(1719881229.078:1301): pid=5155 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.324541 sshd[5155]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:09.326000 audit[5155]: USER_END pid=5155 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.327000 audit[5155]: CRED_DISP pid=5155 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:09.329857 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 00:47:09.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.140:22-139.178.89.65:51904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:09.331179 systemd-logind[1733]: Session 21 logged out. Waiting for processes to exit. Jul 2 00:47:09.331611 systemd[1]: sshd@20-172.31.27.140:22-139.178.89.65:51904.service: Deactivated successfully. Jul 2 00:47:09.334034 systemd-logind[1733]: Removed session 21. Jul 2 00:47:14.352841 systemd[1]: Started sshd@21-172.31.27.140:22-139.178.89.65:51920.service. Jul 2 00:47:14.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.140:22-139.178.89.65:51920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:14.355587 kernel: kauditd_printk_skb: 4 callbacks suppressed Jul 2 00:47:14.355675 kernel: audit: type=1130 audit(1719881234.352:1306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.140:22-139.178.89.65:51920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:14.523000 audit[5174]: USER_ACCT pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.527636 sshd[5174]: Accepted publickey for core from 139.178.89.65 port 51920 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:14.535512 kernel: audit: type=1101 audit(1719881234.523:1307): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.534000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.541271 sshd[5174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:14.549351 kernel: audit: type=1103 audit(1719881234.534:1308): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.549748 kernel: audit: type=1006 audit(1719881234.539:1309): pid=5174 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 00:47:14.549815 kernel: audit: type=1300 audit(1719881234.539:1309): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd79ecfa0 a2=3 a3=1 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:14.539000 audit[5174]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd79ecfa0 a2=3 a3=1 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:14.539000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:14.562617 kernel: audit: type=1327 audit(1719881234.539:1309): proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:14.565304 systemd[1]: Started session-22.scope. Jul 2 00:47:14.566140 systemd-logind[1733]: New session 22 of user core. Jul 2 00:47:14.575000 audit[5174]: USER_START pid=5174 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.578000 audit[5176]: CRED_ACQ pid=5176 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.594187 kernel: audit: type=1105 audit(1719881234.575:1310): pid=5174 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.594308 kernel: audit: type=1103 audit(1719881234.578:1311): pid=5176 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.813842 sshd[5174]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:14.814000 audit[5174]: USER_END pid=5174 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.818419 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 00:47:14.819736 systemd[1]: sshd@21-172.31.27.140:22-139.178.89.65:51920.service: Deactivated successfully. Jul 2 00:47:14.814000 audit[5174]: CRED_DISP pid=5174 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.834556 kernel: audit: type=1106 audit(1719881234.814:1312): pid=5174 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.834748 kernel: audit: type=1104 audit(1719881234.814:1313): pid=5174 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:14.834575 systemd-logind[1733]: Session 22 logged out. Waiting for processes to exit. Jul 2 00:47:14.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.140:22-139.178.89.65:51920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:14.836835 systemd-logind[1733]: Removed session 22. Jul 2 00:47:17.014000 audit[5186]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=5186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:17.014000 audit[5186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe9b786a0 a2=0 a3=1 items=0 ppid=2962 pid=5186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:17.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:17.019000 audit[5186]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=5186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:17.019000 audit[5186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffe9b786a0 a2=0 a3=1 items=0 ppid=2962 pid=5186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:17.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:19.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.140:22-139.178.89.65:55576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:19.845242 systemd[1]: Started sshd@22-172.31.27.140:22-139.178.89.65:55576.service. Jul 2 00:47:19.847947 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 00:47:19.848041 kernel: audit: type=1130 audit(1719881239.844:1317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.140:22-139.178.89.65:55576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:19.888779 systemd[1]: run-containerd-runc-k8s.io-131fedf3c0db9fc67e32150ab124f5d57a9408a6d12c967dead943c44f1b6b01-runc.yYSnBc.mount: Deactivated successfully. Jul 2 00:47:20.012220 kubelet[2820]: I0702 00:47:20.012178 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-7wf2w" podStartSLOduration=75.985861049 podStartE2EDuration="1m24.012081769s" podCreationTimestamp="2024-07-02 00:45:56 +0000 UTC" firstStartedPulling="2024-07-02 00:46:23.622001743 +0000 UTC m=+48.039616413" lastFinishedPulling="2024-07-02 00:46:31.648222463 +0000 UTC m=+56.065837133" observedRunningTime="2024-07-02 00:46:32.265141295 +0000 UTC m=+56.682755989" watchObservedRunningTime="2024-07-02 00:47:20.012081769 +0000 UTC m=+104.429696451" Jul 2 00:47:20.027261 sshd[5201]: Accepted publickey for core from 139.178.89.65 port 55576 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:20.025000 audit[5201]: USER_ACCT pid=5201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.036000 audit[5201]: CRED_ACQ pid=5201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.038599 sshd[5201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:20.049240 kernel: audit: type=1101 audit(1719881240.025:1318): pid=5201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.049394 kernel: audit: type=1103 audit(1719881240.036:1319): pid=5201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.055417 kernel: audit: type=1006 audit(1719881240.036:1320): pid=5201 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 00:47:20.055602 systemd-logind[1733]: New session 23 of user core. Jul 2 00:47:20.065516 kernel: audit: type=1300 audit(1719881240.036:1320): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa158050 a2=3 a3=1 items=0 ppid=1 pid=5201 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:20.036000 audit[5201]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa158050 a2=3 a3=1 items=0 ppid=1 pid=5201 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:20.056875 systemd[1]: Started session-23.scope. Jul 2 00:47:20.036000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:20.070819 kernel: audit: type=1327 audit(1719881240.036:1320): proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:20.065000 audit[5201]: USER_START pid=5201 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.082628 kernel: audit: type=1105 audit(1719881240.065:1321): pid=5201 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.082809 kernel: audit: type=1103 audit(1719881240.070:1322): pid=5216 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.070000 audit[5216]: CRED_ACQ pid=5216 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.307558 sshd[5201]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:20.308000 audit[5201]: USER_END pid=5201 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.314723 systemd-logind[1733]: Session 23 logged out. Waiting for processes to exit. Jul 2 00:47:20.317504 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 00:47:20.319599 systemd-logind[1733]: Removed session 23. Jul 2 00:47:20.308000 audit[5201]: CRED_DISP pid=5201 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.325755 systemd[1]: sshd@22-172.31.27.140:22-139.178.89.65:55576.service: Deactivated successfully. Jul 2 00:47:20.329088 kernel: audit: type=1106 audit(1719881240.308:1323): pid=5201 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.329200 kernel: audit: type=1104 audit(1719881240.308:1324): pid=5201 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:20.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.140:22-139.178.89.65:55576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:25.349176 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 00:47:25.349337 kernel: audit: type=1130 audit(1719881245.338:1326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.140:22-139.178.89.65:55582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:25.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.140:22-139.178.89.65:55582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:25.339865 systemd[1]: Started sshd@23-172.31.27.140:22-139.178.89.65:55582.service. Jul 2 00:47:25.521000 audit[5231]: USER_ACCT pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.523201 sshd[5231]: Accepted publickey for core from 139.178.89.65 port 55582 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:25.526394 sshd[5231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:25.521000 audit[5231]: CRED_ACQ pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.540465 kernel: audit: type=1101 audit(1719881245.521:1327): pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.540598 kernel: audit: type=1103 audit(1719881245.521:1328): pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.548742 kernel: audit: type=1006 audit(1719881245.521:1329): pid=5231 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 00:47:25.550286 systemd-logind[1733]: New session 24 of user core. Jul 2 00:47:25.521000 audit[5231]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8f32f30 a2=3 a3=1 items=0 ppid=1 pid=5231 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:25.551727 systemd[1]: Started session-24.scope. Jul 2 00:47:25.560248 kernel: audit: type=1300 audit(1719881245.521:1329): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8f32f30 a2=3 a3=1 items=0 ppid=1 pid=5231 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:25.521000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:25.566098 kernel: audit: type=1327 audit(1719881245.521:1329): proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:25.573000 audit[5231]: USER_START pid=5231 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.585000 audit[5233]: CRED_ACQ pid=5233 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.597774 kernel: audit: type=1105 audit(1719881245.573:1330): pid=5231 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.597931 kernel: audit: type=1103 audit(1719881245.585:1331): pid=5233 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.874515 sshd[5231]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:25.876000 audit[5231]: USER_END pid=5231 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.890189 systemd[1]: sshd@23-172.31.27.140:22-139.178.89.65:55582.service: Deactivated successfully. Jul 2 00:47:25.891596 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 00:47:25.892730 systemd-logind[1733]: Session 24 logged out. Waiting for processes to exit. Jul 2 00:47:25.876000 audit[5231]: CRED_DISP pid=5231 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.895033 systemd-logind[1733]: Removed session 24. Jul 2 00:47:25.902755 kernel: audit: type=1106 audit(1719881245.876:1332): pid=5231 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.902926 kernel: audit: type=1104 audit(1719881245.876:1333): pid=5231 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:25.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.140:22-139.178.89.65:55582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:26.137325 kubelet[2820]: I0702 00:47:26.137142 2820 topology_manager.go:215] "Topology Admit Handler" podUID="c96e22c7-1f58-4a18-b052-da50c6a0da31" podNamespace="calico-apiserver" podName="calico-apiserver-5fd4d99d4d-tgst8" Jul 2 00:47:26.152846 systemd[1]: Created slice kubepods-besteffort-podc96e22c7_1f58_4a18_b052_da50c6a0da31.slice. Jul 2 00:47:26.220630 kubelet[2820]: I0702 00:47:26.220574 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c96e22c7-1f58-4a18-b052-da50c6a0da31-calico-apiserver-certs\") pod \"calico-apiserver-5fd4d99d4d-tgst8\" (UID: \"c96e22c7-1f58-4a18-b052-da50c6a0da31\") " pod="calico-apiserver/calico-apiserver-5fd4d99d4d-tgst8" Jul 2 00:47:26.220822 kubelet[2820]: I0702 00:47:26.220688 2820 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-psvh2\" (UniqueName: \"kubernetes.io/projected/c96e22c7-1f58-4a18-b052-da50c6a0da31-kube-api-access-psvh2\") pod \"calico-apiserver-5fd4d99d4d-tgst8\" (UID: \"c96e22c7-1f58-4a18-b052-da50c6a0da31\") " pod="calico-apiserver/calico-apiserver-5fd4d99d4d-tgst8" Jul 2 00:47:26.228000 audit[5243]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=5243 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:26.228000 audit[5243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff502f760 a2=0 a3=1 items=0 ppid=2962 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:26.228000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:26.232000 audit[5243]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=5243 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:26.232000 audit[5243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=fffff502f760 a2=0 a3=1 items=0 ppid=2962 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:26.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:26.247000 audit[5245]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=5245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:26.247000 audit[5245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffeccc9190 a2=0 a3=1 items=0 ppid=2962 pid=5245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:26.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:26.250000 audit[5245]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=5245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:26.250000 audit[5245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffeccc9190 a2=0 a3=1 items=0 ppid=2962 pid=5245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:26.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:26.321984 kubelet[2820]: E0702 00:47:26.321938 2820 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 00:47:26.322344 kubelet[2820]: E0702 00:47:26.322317 2820 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c96e22c7-1f58-4a18-b052-da50c6a0da31-calico-apiserver-certs podName:c96e22c7-1f58-4a18-b052-da50c6a0da31 nodeName:}" failed. No retries permitted until 2024-07-02 00:47:26.822281888 +0000 UTC m=+111.239896558 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/c96e22c7-1f58-4a18-b052-da50c6a0da31-calico-apiserver-certs") pod "calico-apiserver-5fd4d99d4d-tgst8" (UID: "c96e22c7-1f58-4a18-b052-da50c6a0da31") : secret "calico-apiserver-certs" not found Jul 2 00:47:27.059598 env[1742]: time="2024-07-02T00:47:27.059523228Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd4d99d4d-tgst8,Uid:c96e22c7-1f58-4a18-b052-da50c6a0da31,Namespace:calico-apiserver,Attempt:0,}" Jul 2 00:47:27.335312 systemd-networkd[1461]: cali1d60fea1592: Link UP Jul 2 00:47:27.340477 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:47:27.340619 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1d60fea1592: link becomes ready Jul 2 00:47:27.340847 systemd-networkd[1461]: cali1d60fea1592: Gained carrier Jul 2 00:47:27.343057 (udev-worker)[5266]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.162 [INFO][5248] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0 calico-apiserver-5fd4d99d4d- calico-apiserver c96e22c7-1f58-4a18-b052-da50c6a0da31 1144 0 2024-07-02 00:47:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5fd4d99d4d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-140 calico-apiserver-5fd4d99d4d-tgst8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1d60fea1592 [] []}} ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Namespace="calico-apiserver" Pod="calico-apiserver-5fd4d99d4d-tgst8" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.163 [INFO][5248] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Namespace="calico-apiserver" Pod="calico-apiserver-5fd4d99d4d-tgst8" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.216 [INFO][5259] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" HandleID="k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Workload="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.259 [INFO][5259] ipam_plugin.go 264: Auto assigning IP ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" HandleID="k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Workload="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000320380), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-140", "pod":"calico-apiserver-5fd4d99d4d-tgst8", "timestamp":"2024-07-02 00:47:27.21684541 +0000 UTC"}, Hostname:"ip-172-31-27-140", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.259 [INFO][5259] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.259 [INFO][5259] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.259 [INFO][5259] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-140' Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.263 [INFO][5259] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.276 [INFO][5259] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.286 [INFO][5259] ipam.go 489: Trying affinity for 192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.291 [INFO][5259] ipam.go 155: Attempting to load block cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.295 [INFO][5259] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.0/26 host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.295 [INFO][5259] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.0/26 handle="k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.300 [INFO][5259] ipam.go 1685: Creating new handle: k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.313 [INFO][5259] ipam.go 1203: Writing block in order to claim IPs block=192.168.91.0/26 handle="k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.322 [INFO][5259] ipam.go 1216: Successfully claimed IPs: [192.168.91.5/26] block=192.168.91.0/26 handle="k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.323 [INFO][5259] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.5/26] handle="k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" host="ip-172-31-27-140" Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.323 [INFO][5259] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:27.377601 env[1742]: 2024-07-02 00:47:27.323 [INFO][5259] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.91.5/26] IPv6=[] ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" HandleID="k8s-pod-network.ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Workload="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" Jul 2 00:47:27.378968 env[1742]: 2024-07-02 00:47:27.326 [INFO][5248] k8s.go 386: Populated endpoint ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Namespace="calico-apiserver" Pod="calico-apiserver-5fd4d99d4d-tgst8" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0", GenerateName:"calico-apiserver-5fd4d99d4d-", Namespace:"calico-apiserver", SelfLink:"", UID:"c96e22c7-1f58-4a18-b052-da50c6a0da31", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd4d99d4d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"", Pod:"calico-apiserver-5fd4d99d4d-tgst8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.91.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1d60fea1592", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:27.378968 env[1742]: 2024-07-02 00:47:27.326 [INFO][5248] k8s.go 387: Calico CNI using IPs: [192.168.91.5/32] ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Namespace="calico-apiserver" Pod="calico-apiserver-5fd4d99d4d-tgst8" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" Jul 2 00:47:27.378968 env[1742]: 2024-07-02 00:47:27.326 [INFO][5248] dataplane_linux.go 68: Setting the host side veth name to cali1d60fea1592 ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Namespace="calico-apiserver" Pod="calico-apiserver-5fd4d99d4d-tgst8" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" Jul 2 00:47:27.378968 env[1742]: 2024-07-02 00:47:27.335 [INFO][5248] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Namespace="calico-apiserver" Pod="calico-apiserver-5fd4d99d4d-tgst8" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" Jul 2 00:47:27.378968 env[1742]: 2024-07-02 00:47:27.341 [INFO][5248] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Namespace="calico-apiserver" Pod="calico-apiserver-5fd4d99d4d-tgst8" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0", GenerateName:"calico-apiserver-5fd4d99d4d-", Namespace:"calico-apiserver", SelfLink:"", UID:"c96e22c7-1f58-4a18-b052-da50c6a0da31", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd4d99d4d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-140", ContainerID:"ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e", Pod:"calico-apiserver-5fd4d99d4d-tgst8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.91.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1d60fea1592", MAC:"76:d8:ae:8a:39:31", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:27.378968 env[1742]: 2024-07-02 00:47:27.367 [INFO][5248] k8s.go 500: Wrote updated endpoint to datastore ContainerID="ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e" Namespace="calico-apiserver" Pod="calico-apiserver-5fd4d99d4d-tgst8" WorkloadEndpoint="ip--172--31--27--140-k8s-calico--apiserver--5fd4d99d4d--tgst8-eth0" Jul 2 00:47:27.426734 env[1742]: time="2024-07-02T00:47:27.425635723Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:47:27.426734 env[1742]: time="2024-07-02T00:47:27.425711399Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:47:27.426734 env[1742]: time="2024-07-02T00:47:27.425738496Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:47:27.427107 env[1742]: time="2024-07-02T00:47:27.426741709Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e pid=5285 runtime=io.containerd.runc.v2 Jul 2 00:47:27.474057 systemd[1]: Started cri-containerd-ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e.scope. Jul 2 00:47:27.495718 systemd[1]: run-containerd-runc-k8s.io-ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e-runc.uKq0q4.mount: Deactivated successfully. Jul 2 00:47:27.512000 audit[5307]: NETFILTER_CFG table=filter:123 family=2 entries=55 op=nft_register_chain pid=5307 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:27.512000 audit[5307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27464 a0=3 a1=ffffde9b6c40 a2=0 a3=ffff94cf1fa8 items=0 ppid=3796 pid=5307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:27.512000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.541000 audit: BPF prog-id=177 op=LOAD Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5285 pid=5296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:27.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363656332386465663863373132656361653861643137393335303438 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5285 pid=5296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:27.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363656332386465663863373132656361653861643137393335303438 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit: BPF prog-id=178 op=LOAD Jul 2 00:47:27.542000 audit[5296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5285 pid=5296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:27.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363656332386465663863373132656361653861643137393335303438 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.542000 audit: BPF prog-id=179 op=LOAD Jul 2 00:47:27.542000 audit[5296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5285 pid=5296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:27.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363656332386465663863373132656361653861643137393335303438 Jul 2 00:47:27.543000 audit: BPF prog-id=179 op=UNLOAD Jul 2 00:47:27.543000 audit: BPF prog-id=178 op=UNLOAD Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { perfmon } for pid=5296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit[5296]: AVC avc: denied { bpf } for pid=5296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:27.543000 audit: BPF prog-id=180 op=LOAD Jul 2 00:47:27.543000 audit[5296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5285 pid=5296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:27.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363656332386465663863373132656361653861643137393335303438 Jul 2 00:47:27.595767 env[1742]: time="2024-07-02T00:47:27.595622281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd4d99d4d-tgst8,Uid:c96e22c7-1f58-4a18-b052-da50c6a0da31,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e\"" Jul 2 00:47:27.599815 env[1742]: time="2024-07-02T00:47:27.598764634Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 00:47:28.626744 systemd-networkd[1461]: cali1d60fea1592: Gained IPv6LL Jul 2 00:47:30.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.140:22-139.178.89.65:47068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:30.903576 systemd[1]: Started sshd@24-172.31.27.140:22-139.178.89.65:47068.service. Jul 2 00:47:30.906020 kernel: kauditd_printk_skb: 73 callbacks suppressed Jul 2 00:47:30.906146 kernel: audit: type=1130 audit(1719881250.903:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.140:22-139.178.89.65:47068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:31.077470 kernel: audit: type=1400 audit(1719881251.068:1359): avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.068000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.068000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40019983e0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:47:31.113888 kernel: audit: type=1300 audit(1719881251.068:1359): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40019983e0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:47:31.114018 kernel: audit: type=1327 audit(1719881251.068:1359): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:47:31.068000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:47:31.082000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.124139 kernel: audit: type=1400 audit(1719881251.082:1360): avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.082000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40018370e0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:47:31.138501 kernel: audit: type=1300 audit(1719881251.082:1360): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40018370e0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:47:31.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:47:31.150818 kernel: audit: type=1327 audit(1719881251.082:1360): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:47:31.097000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.161059 sshd[5322]: Accepted publickey for core from 139.178.89.65 port 47068 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:31.170383 sshd[5322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:31.097000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400479bf80 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:47:31.183149 kernel: audit: type=1400 audit(1719881251.097:1362): avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.183289 kernel: audit: type=1300 audit(1719881251.097:1362): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400479bf80 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:47:31.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:47:31.193371 kernel: audit: type=1327 audit(1719881251.097:1362): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:47:31.098000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.098000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400d6b18a0 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:47:31.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:47:31.097000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.097000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=40043da660 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:47:31.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:47:31.118000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.118000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4004562240 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:47:31.118000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:47:31.118000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.118000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400d6b1c40 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:47:31.118000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:47:31.118000 audit[2569]: AVC avc: denied { watch } for pid=2569 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:31.118000 audit[2569]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40045622d0 a2=fc6 a3=0 items=0 ppid=2420 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c675 key=(null) Jul 2 00:47:31.118000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 00:47:31.152000 audit[5322]: USER_ACCT pid=5322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:31.168000 audit[5322]: CRED_ACQ pid=5322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:31.168000 audit[5322]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc347e7c0 a2=3 a3=1 items=0 ppid=1 pid=5322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.168000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:31.183000 audit[5325]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=5325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:31.183000 audit[5325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd8452c20 a2=0 a3=1 items=0 ppid=2962 pid=5325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.183000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:31.206000 audit[5325]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=5325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:31.203585 systemd[1]: Started session-25.scope. Jul 2 00:47:31.206439 systemd-logind[1733]: New session 25 of user core. Jul 2 00:47:31.220000 audit[5322]: USER_START pid=5322 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:31.206000 audit[5325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffd8452c20 a2=0 a3=1 items=0 ppid=2962 pid=5325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:31.226000 audit[5326]: CRED_ACQ pid=5326 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:31.555532 sshd[5322]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:31.557000 audit[5322]: USER_END pid=5322 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:31.557000 audit[5322]: CRED_DISP pid=5322 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:31.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.140:22-139.178.89.65:47068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:31.561275 systemd[1]: sshd@24-172.31.27.140:22-139.178.89.65:47068.service: Deactivated successfully. Jul 2 00:47:31.562603 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 00:47:31.565331 systemd-logind[1733]: Session 25 logged out. Waiting for processes to exit. Jul 2 00:47:31.569118 systemd-logind[1733]: Removed session 25. Jul 2 00:47:31.580079 env[1742]: time="2024-07-02T00:47:31.580020540Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:31.586436 env[1742]: time="2024-07-02T00:47:31.586383367Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:31.591386 env[1742]: time="2024-07-02T00:47:31.591336337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:31.595992 env[1742]: time="2024-07-02T00:47:31.595936765Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:31.597553 env[1742]: time="2024-07-02T00:47:31.597495586Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac\"" Jul 2 00:47:31.602660 env[1742]: time="2024-07-02T00:47:31.602573807Z" level=info msg="CreateContainer within sandbox \"ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 00:47:31.628170 env[1742]: time="2024-07-02T00:47:31.628105941Z" level=info msg="CreateContainer within sandbox \"ccec28def8c712ecae8ad1793504814058efa02fb3156ef02501d6d3bb900a9e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"abcab684e3bfed06cd323bcc7f69ec89444bf8f5b030e464f0f716c29624a305\"" Jul 2 00:47:31.629276 env[1742]: time="2024-07-02T00:47:31.629091984Z" level=info msg="StartContainer for \"abcab684e3bfed06cd323bcc7f69ec89444bf8f5b030e464f0f716c29624a305\"" Jul 2 00:47:31.691223 systemd[1]: run-containerd-runc-k8s.io-abcab684e3bfed06cd323bcc7f69ec89444bf8f5b030e464f0f716c29624a305-runc.RxijpY.mount: Deactivated successfully. Jul 2 00:47:31.703216 systemd[1]: Started cri-containerd-abcab684e3bfed06cd323bcc7f69ec89444bf8f5b030e464f0f716c29624a305.scope. Jul 2 00:47:31.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.780000 audit: BPF prog-id=181 op=LOAD Jul 2 00:47:31.782000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.782000 audit[5344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5285 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162636162363834653362666564303663643332336263633766363965 Jul 2 00:47:31.782000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.782000 audit[5344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5285 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162636162363834653362666564303663643332336263633766363965 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit: BPF prog-id=182 op=LOAD Jul 2 00:47:31.783000 audit[5344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5285 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162636162363834653362666564303663643332336263633766363965 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit: BPF prog-id=183 op=LOAD Jul 2 00:47:31.783000 audit[5344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5285 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162636162363834653362666564303663643332336263633766363965 Jul 2 00:47:31.783000 audit: BPF prog-id=183 op=UNLOAD Jul 2 00:47:31.783000 audit: BPF prog-id=182 op=UNLOAD Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { perfmon } for pid=5344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit[5344]: AVC avc: denied { bpf } for pid=5344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:31.783000 audit: BPF prog-id=184 op=LOAD Jul 2 00:47:31.783000 audit[5344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5285 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162636162363834653362666564303663643332336263633766363965 Jul 2 00:47:31.899106 env[1742]: time="2024-07-02T00:47:31.898091568Z" level=info msg="StartContainer for \"abcab684e3bfed06cd323bcc7f69ec89444bf8f5b030e464f0f716c29624a305\" returns successfully" Jul 2 00:47:32.511000 audit[5374]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=5374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.511000 audit[5374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc66f4530 a2=0 a3=1 items=0 ppid=2962 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:32.531000 audit[5374]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=5374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.531000 audit[5374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffc66f4530 a2=0 a3=1 items=0 ppid=2962 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:32.932000 audit[5383]: NETFILTER_CFG table=filter:128 family=2 entries=9 op=nft_register_rule pid=5383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.932000 audit[5383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffee636820 a2=0 a3=1 items=0 ppid=2962 pid=5383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:32.936000 audit[5383]: NETFILTER_CFG table=nat:129 family=2 entries=51 op=nft_register_chain pid=5383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.936000 audit[5383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffee636820 a2=0 a3=1 items=0 ppid=2962 pid=5383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:34.012000 audit[5353]: AVC avc: denied { watch } for pid=5353 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_00_47_26.605794650/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c184 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c29,c184 tclass=file permissive=0 Jul 2 00:47:34.012000 audit[5353]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40006953e0 a2=fc6 a3=0 items=0 ppid=5285 pid=5353 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c184 key=(null) Jul 2 00:47:34.012000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 00:47:34.069058 kubelet[2820]: I0702 00:47:34.068999 2820 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5fd4d99d4d-tgst8" podStartSLOduration=4.068416629 podStartE2EDuration="8.068930283s" podCreationTimestamp="2024-07-02 00:47:26 +0000 UTC" firstStartedPulling="2024-07-02 00:47:27.597910553 +0000 UTC m=+112.015525223" lastFinishedPulling="2024-07-02 00:47:31.598424207 +0000 UTC m=+116.016038877" observedRunningTime="2024-07-02 00:47:32.456254781 +0000 UTC m=+116.873869559" watchObservedRunningTime="2024-07-02 00:47:34.068930283 +0000 UTC m=+118.486544953" Jul 2 00:47:34.103000 audit[5386]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=5386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:34.103000 audit[5386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcd61f310 a2=0 a3=1 items=0 ppid=2962 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:34.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:34.110000 audit[5386]: NETFILTER_CFG table=nat:131 family=2 entries=58 op=nft_register_chain pid=5386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:34.110000 audit[5386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffcd61f310 a2=0 a3=1 items=0 ppid=2962 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:34.110000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:36.584438 systemd[1]: Started sshd@25-172.31.27.140:22-139.178.89.65:47074.service. Jul 2 00:47:36.595355 kernel: kauditd_printk_skb: 109 callbacks suppressed Jul 2 00:47:36.595537 kernel: audit: type=1130 audit(1719881256.585:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.140:22-139.178.89.65:47074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:36.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.140:22-139.178.89.65:47074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:36.761000 audit[5390]: USER_ACCT pid=5390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:36.771698 sshd[5390]: Accepted publickey for core from 139.178.89.65 port 47074 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:36.773000 audit[5390]: CRED_ACQ pid=5390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:36.785794 kernel: audit: type=1101 audit(1719881256.761:1403): pid=5390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:36.785968 kernel: audit: type=1103 audit(1719881256.773:1404): pid=5390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:36.775574 sshd[5390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:36.794810 systemd-logind[1733]: New session 26 of user core. Jul 2 00:47:36.796810 systemd[1]: Started session-26.scope. Jul 2 00:47:36.800512 kernel: audit: type=1006 audit(1719881256.773:1405): pid=5390 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 00:47:36.773000 audit[5390]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeba945d0 a2=3 a3=1 items=0 ppid=1 pid=5390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:36.812930 kernel: audit: type=1300 audit(1719881256.773:1405): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeba945d0 a2=3 a3=1 items=0 ppid=1 pid=5390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:36.773000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:36.819989 kernel: audit: type=1327 audit(1719881256.773:1405): proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:36.816000 audit[5390]: USER_START pid=5390 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:36.830904 kernel: audit: type=1105 audit(1719881256.816:1406): pid=5390 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:36.830000 audit[5393]: CRED_ACQ pid=5393 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:36.839888 kernel: audit: type=1103 audit(1719881256.830:1407): pid=5393 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:37.187627 sshd[5390]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:37.189000 audit[5390]: USER_END pid=5390 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:37.194397 systemd[1]: sshd@25-172.31.27.140:22-139.178.89.65:47074.service: Deactivated successfully. Jul 2 00:47:37.195637 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 00:47:37.197361 systemd-logind[1733]: Session 26 logged out. Waiting for processes to exit. Jul 2 00:47:37.199854 systemd-logind[1733]: Removed session 26. Jul 2 00:47:37.189000 audit[5390]: CRED_DISP pid=5390 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:37.211070 kernel: audit: type=1106 audit(1719881257.189:1408): pid=5390 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:37.211249 kernel: audit: type=1104 audit(1719881257.189:1409): pid=5390 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:37.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.140:22-139.178.89.65:47074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:38.532582 systemd[1]: run-containerd-runc-k8s.io-4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85-runc.ReIQpO.mount: Deactivated successfully. Jul 2 00:47:42.217870 systemd[1]: Started sshd@26-172.31.27.140:22-139.178.89.65:42764.service. Jul 2 00:47:42.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.140:22-139.178.89.65:42764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:42.221157 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 00:47:42.221296 kernel: audit: type=1130 audit(1719881262.217:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.140:22-139.178.89.65:42764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:42.395000 audit[5430]: USER_ACCT pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.398902 sshd[5430]: Accepted publickey for core from 139.178.89.65 port 42764 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:42.401023 sshd[5430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:42.398000 audit[5430]: CRED_ACQ pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.417261 kernel: audit: type=1101 audit(1719881262.395:1412): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.417352 kernel: audit: type=1103 audit(1719881262.398:1413): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.424476 kernel: audit: type=1006 audit(1719881262.398:1414): pid=5430 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jul 2 00:47:42.424258 systemd[1]: Started session-27.scope. Jul 2 00:47:42.398000 audit[5430]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf855340 a2=3 a3=1 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:42.426625 systemd-logind[1733]: New session 27 of user core. Jul 2 00:47:42.433819 kernel: audit: type=1300 audit(1719881262.398:1414): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf855340 a2=3 a3=1 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:42.398000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:42.437501 kernel: audit: type=1327 audit(1719881262.398:1414): proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:42.444000 audit[5430]: USER_START pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.457000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.467807 kernel: audit: type=1105 audit(1719881262.444:1415): pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.468005 kernel: audit: type=1103 audit(1719881262.457:1416): pid=5432 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.716625 sshd[5430]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:42.717000 audit[5430]: USER_END pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.722482 systemd[1]: session-27.scope: Deactivated successfully. Jul 2 00:47:42.724004 systemd[1]: sshd@26-172.31.27.140:22-139.178.89.65:42764.service: Deactivated successfully. Jul 2 00:47:42.725602 systemd-logind[1733]: Session 27 logged out. Waiting for processes to exit. Jul 2 00:47:42.728180 systemd-logind[1733]: Removed session 27. Jul 2 00:47:42.717000 audit[5430]: CRED_DISP pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.737262 kernel: audit: type=1106 audit(1719881262.717:1417): pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.737393 kernel: audit: type=1104 audit(1719881262.717:1418): pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:42.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.140:22-139.178.89.65:42764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:45.181000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:45.181000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029a6260 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:47:45.181000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:47:45.185000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:45.185000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027332a0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:47:45.185000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:47:45.186000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:45.186000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029a6400 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:47:45.186000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:47:45.188000 audit[2606]: AVC avc: denied { watch } for pid=2606 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:47:45.188000 audit[2606]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029a65a0 a2=fc6 a3=0 items=0 ppid=2419 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:47:45.188000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:47:47.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.27.140:22-139.178.89.65:42766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:47.745013 systemd[1]: Started sshd@27-172.31.27.140:22-139.178.89.65:42766.service. Jul 2 00:47:47.751474 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 00:47:47.751632 kernel: audit: type=1130 audit(1719881267.744:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.27.140:22-139.178.89.65:42766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:47.916000 audit[5449]: USER_ACCT pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:47.917472 sshd[5449]: Accepted publickey for core from 139.178.89.65 port 42766 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:47:47.929098 sshd[5449]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:47:47.927000 audit[5449]: CRED_ACQ pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:47.937843 kernel: audit: type=1101 audit(1719881267.916:1425): pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:47.937990 kernel: audit: type=1103 audit(1719881267.927:1426): pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:47.945004 systemd-logind[1733]: New session 28 of user core. Jul 2 00:47:47.946667 systemd[1]: Started session-28.scope. Jul 2 00:47:47.949480 kernel: audit: type=1006 audit(1719881267.927:1427): pid=5449 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Jul 2 00:47:47.927000 audit[5449]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc63896c0 a2=3 a3=1 items=0 ppid=1 pid=5449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:47.964003 kernel: audit: type=1300 audit(1719881267.927:1427): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc63896c0 a2=3 a3=1 items=0 ppid=1 pid=5449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:47.927000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:47.969679 kernel: audit: type=1327 audit(1719881267.927:1427): proctitle=737368643A20636F7265205B707269765D Jul 2 00:47:47.990234 kernel: audit: type=1105 audit(1719881267.972:1428): pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:47.972000 audit[5449]: USER_START pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:47.974000 audit[5451]: CRED_ACQ pid=5451 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:48.005604 kernel: audit: type=1103 audit(1719881267.974:1429): pid=5451 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:48.226304 sshd[5449]: pam_unix(sshd:session): session closed for user core Jul 2 00:47:48.228000 audit[5449]: USER_END pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:48.232353 systemd-logind[1733]: Session 28 logged out. Waiting for processes to exit. Jul 2 00:47:48.235280 systemd[1]: session-28.scope: Deactivated successfully. Jul 2 00:47:48.237825 systemd[1]: sshd@27-172.31.27.140:22-139.178.89.65:42766.service: Deactivated successfully. Jul 2 00:47:48.229000 audit[5449]: CRED_DISP pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:48.241742 systemd-logind[1733]: Removed session 28. Jul 2 00:47:48.248825 kernel: audit: type=1106 audit(1719881268.228:1430): pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:48.248946 kernel: audit: type=1104 audit(1719881268.229:1431): pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:47:48.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.27.140:22-139.178.89.65:42766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:48:01.929246 systemd[1]: run-containerd-runc-k8s.io-4f57f5224f3e419ccadebc26850ec72d95f35e5ed3971d36896d167b19f88d85-runc.27fbb7.mount: Deactivated successfully. Jul 2 00:48:02.510904 systemd[1]: cri-containerd-3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02.scope: Deactivated successfully. Jul 2 00:48:02.511543 systemd[1]: cri-containerd-3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02.scope: Consumed 11.475s CPU time. Jul 2 00:48:02.510000 audit: BPF prog-id=114 op=UNLOAD Jul 2 00:48:02.514254 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 00:48:02.514421 kernel: audit: type=1334 audit(1719881282.510:1433): prog-id=114 op=UNLOAD Jul 2 00:48:02.516000 audit: BPF prog-id=117 op=UNLOAD Jul 2 00:48:02.520860 kernel: audit: type=1334 audit(1719881282.516:1434): prog-id=117 op=UNLOAD Jul 2 00:48:02.557975 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02-rootfs.mount: Deactivated successfully. Jul 2 00:48:02.559851 env[1742]: time="2024-07-02T00:48:02.559687736Z" level=info msg="shim disconnected" id=3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02 Jul 2 00:48:02.560474 env[1742]: time="2024-07-02T00:48:02.559855291Z" level=warning msg="cleaning up after shim disconnected" id=3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02 namespace=k8s.io Jul 2 00:48:02.560474 env[1742]: time="2024-07-02T00:48:02.559879004Z" level=info msg="cleaning up dead shim" Jul 2 00:48:02.574183 env[1742]: time="2024-07-02T00:48:02.574116417Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:48:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5531 runtime=io.containerd.runc.v2\n" Jul 2 00:48:03.084160 systemd[1]: cri-containerd-6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5.scope: Deactivated successfully. Jul 2 00:48:03.084737 systemd[1]: cri-containerd-6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5.scope: Consumed 5.399s CPU time. Jul 2 00:48:03.087000 audit: BPF prog-id=77 op=UNLOAD Jul 2 00:48:03.087000 audit: BPF prog-id=100 op=UNLOAD Jul 2 00:48:03.093617 kernel: audit: type=1334 audit(1719881283.087:1435): prog-id=77 op=UNLOAD Jul 2 00:48:03.093780 kernel: audit: type=1334 audit(1719881283.087:1436): prog-id=100 op=UNLOAD Jul 2 00:48:03.137150 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5-rootfs.mount: Deactivated successfully. Jul 2 00:48:03.140585 env[1742]: time="2024-07-02T00:48:03.140523506Z" level=info msg="shim disconnected" id=6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5 Jul 2 00:48:03.140958 env[1742]: time="2024-07-02T00:48:03.140920156Z" level=warning msg="cleaning up after shim disconnected" id=6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5 namespace=k8s.io Jul 2 00:48:03.141109 env[1742]: time="2024-07-02T00:48:03.141078423Z" level=info msg="cleaning up dead shim" Jul 2 00:48:03.156804 env[1742]: time="2024-07-02T00:48:03.156747211Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:48:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5556 runtime=io.containerd.runc.v2\n" Jul 2 00:48:03.526315 kubelet[2820]: I0702 00:48:03.526211 2820 scope.go:117] "RemoveContainer" containerID="3a37f33c3bf58448b123f17af8fae98736bada58bb1366de6a6028c19e445f02" Jul 2 00:48:03.530813 env[1742]: time="2024-07-02T00:48:03.530731220Z" level=info msg="CreateContainer within sandbox \"6ac67ede71f482e59c763dbd8aa8fe2f9cf8ab89eba47c27969543f4baca21b8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Jul 2 00:48:03.532346 kubelet[2820]: I0702 00:48:03.532289 2820 scope.go:117] "RemoveContainer" containerID="6391eb9dee9dfb0535e9609a2c407023c359a89e237b001bbde682893ba73db5" Jul 2 00:48:03.537279 env[1742]: time="2024-07-02T00:48:03.537163494Z" level=info msg="CreateContainer within sandbox \"6ebce4a0ee0fa36e7880e06f6e8fd4c7ccb9ea15bd1b32fc04492cf0cc00e413\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Jul 2 00:48:03.567526 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4033636313.mount: Deactivated successfully. Jul 2 00:48:03.588077 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4194961475.mount: Deactivated successfully. Jul 2 00:48:03.593916 env[1742]: time="2024-07-02T00:48:03.593818303Z" level=info msg="CreateContainer within sandbox \"6ac67ede71f482e59c763dbd8aa8fe2f9cf8ab89eba47c27969543f4baca21b8\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"c3e483987c806d604483946c3235c42109fae7cd918f50fc13468efeb834973f\"" Jul 2 00:48:03.594897 env[1742]: time="2024-07-02T00:48:03.594847131Z" level=info msg="StartContainer for \"c3e483987c806d604483946c3235c42109fae7cd918f50fc13468efeb834973f\"" Jul 2 00:48:03.596576 env[1742]: time="2024-07-02T00:48:03.596492574Z" level=info msg="CreateContainer within sandbox \"6ebce4a0ee0fa36e7880e06f6e8fd4c7ccb9ea15bd1b32fc04492cf0cc00e413\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"d1ca22a74d8d60f9b380f88359872cea8fcc653ca6c3023cee829db9fa5b031a\"" Jul 2 00:48:03.597597 env[1742]: time="2024-07-02T00:48:03.597534747Z" level=info msg="StartContainer for \"d1ca22a74d8d60f9b380f88359872cea8fcc653ca6c3023cee829db9fa5b031a\"" Jul 2 00:48:03.631898 systemd[1]: Started cri-containerd-c3e483987c806d604483946c3235c42109fae7cd918f50fc13468efeb834973f.scope. Jul 2 00:48:03.653786 systemd[1]: Started cri-containerd-d1ca22a74d8d60f9b380f88359872cea8fcc653ca6c3023cee829db9fa5b031a.scope. Jul 2 00:48:03.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.704144 kernel: audit: type=1400 audit(1719881283.688:1437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.704292 kernel: audit: type=1400 audit(1719881283.694:1438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.712828 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 00:48:03.712976 kernel: audit: audit_lost=32 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 00:48:03.713033 kernel: audit: type=1400 audit(1719881283.694:1439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.719261 kernel: audit: backlog limit exceeded Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.694000 audit: BPF prog-id=185 op=LOAD Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2419 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636132326137346438643630663962333830663838333539383732 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2419 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636132326137346438643630663962333830663838333539383732 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.696000 audit: BPF prog-id=186 op=LOAD Jul 2 00:48:03.696000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2419 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636132326137346438643630663962333830663838333539383732 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit: BPF prog-id=187 op=LOAD Jul 2 00:48:03.703000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2419 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636132326137346438643630663962333830663838333539383732 Jul 2 00:48:03.703000 audit: BPF prog-id=187 op=UNLOAD Jul 2 00:48:03.703000 audit: BPF prog-id=186 op=UNLOAD Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.703000 audit: BPF prog-id=188 op=LOAD Jul 2 00:48:03.703000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2419 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636132326137346438643630663962333830663838333539383732 Jul 2 00:48:03.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.723000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.723000 audit[5583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2984 pid=5583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653438333938376338303664363034343833393436633332333563 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2984 pid=5583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653438333938376338303664363034343833393436633332333563 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit: BPF prog-id=190 op=LOAD Jul 2 00:48:03.724000 audit[5583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2984 pid=5583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653438333938376338303664363034343833393436633332333563 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit: BPF prog-id=191 op=LOAD Jul 2 00:48:03.724000 audit[5583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2984 pid=5583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653438333938376338303664363034343833393436633332333563 Jul 2 00:48:03.724000 audit: BPF prog-id=191 op=UNLOAD Jul 2 00:48:03.724000 audit: BPF prog-id=190 op=UNLOAD Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { perfmon } for pid=5583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit[5583]: AVC avc: denied { bpf } for pid=5583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:03.724000 audit: BPF prog-id=192 op=LOAD Jul 2 00:48:03.724000 audit[5583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2984 pid=5583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:03.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653438333938376338303664363034343833393436633332333563 Jul 2 00:48:03.782372 env[1742]: time="2024-07-02T00:48:03.782235774Z" level=info msg="StartContainer for \"d1ca22a74d8d60f9b380f88359872cea8fcc653ca6c3023cee829db9fa5b031a\" returns successfully" Jul 2 00:48:03.795934 env[1742]: time="2024-07-02T00:48:03.795837209Z" level=info msg="StartContainer for \"c3e483987c806d604483946c3235c42109fae7cd918f50fc13468efeb834973f\" returns successfully" Jul 2 00:48:06.356000 audit[5605]: AVC avc: denied { watch } for pid=5605 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:48:06.356000 audit[5605]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40007de0c0 a2=fc6 a3=0 items=0 ppid=2419 pid=5605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:48:06.356000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:48:06.357000 audit[5605]: AVC avc: denied { watch } for pid=5605 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8262 scontext=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:48:06.357000 audit[5605]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ca8040 a2=fc6 a3=0 items=0 ppid=2419 pid=5605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c200,c717 key=(null) Jul 2 00:48:06.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:48:07.396982 systemd[1]: cri-containerd-c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611.scope: Deactivated successfully. Jul 2 00:48:07.397657 systemd[1]: cri-containerd-c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611.scope: Consumed 4.379s CPU time. Jul 2 00:48:07.400000 audit: BPF prog-id=81 op=UNLOAD Jul 2 00:48:07.400000 audit: BPF prog-id=92 op=UNLOAD Jul 2 00:48:07.449653 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611-rootfs.mount: Deactivated successfully. Jul 2 00:48:07.450207 env[1742]: time="2024-07-02T00:48:07.450148473Z" level=info msg="shim disconnected" id=c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611 Jul 2 00:48:07.450998 env[1742]: time="2024-07-02T00:48:07.450941667Z" level=warning msg="cleaning up after shim disconnected" id=c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611 namespace=k8s.io Jul 2 00:48:07.451165 env[1742]: time="2024-07-02T00:48:07.451133584Z" level=info msg="cleaning up dead shim" Jul 2 00:48:07.467089 env[1742]: time="2024-07-02T00:48:07.467030836Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:48:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5659 runtime=io.containerd.runc.v2\n" Jul 2 00:48:07.551796 kubelet[2820]: I0702 00:48:07.551739 2820 scope.go:117] "RemoveContainer" containerID="c956f05fabca610bc28dda49206d8267c1d1d6c4ebd07ec46947622f2ca3d611" Jul 2 00:48:07.556126 env[1742]: time="2024-07-02T00:48:07.556065688Z" level=info msg="CreateContainer within sandbox \"b53f547ea2173e4011100f1def91accd4d7d6917cd1eb8375760a5dcd1c1793e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Jul 2 00:48:07.583645 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3784064945.mount: Deactivated successfully. Jul 2 00:48:07.593684 env[1742]: time="2024-07-02T00:48:07.593565836Z" level=info msg="CreateContainer within sandbox \"b53f547ea2173e4011100f1def91accd4d7d6917cd1eb8375760a5dcd1c1793e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"1e612d270872e5cd35ff8d7d4408b76f878c0269c7b8041324be29db88b5682d\"" Jul 2 00:48:07.594788 env[1742]: time="2024-07-02T00:48:07.594742468Z" level=info msg="StartContainer for \"1e612d270872e5cd35ff8d7d4408b76f878c0269c7b8041324be29db88b5682d\"" Jul 2 00:48:07.635265 systemd[1]: Started cri-containerd-1e612d270872e5cd35ff8d7d4408b76f878c0269c7b8041324be29db88b5682d.scope. Jul 2 00:48:07.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.672916 kernel: kauditd_printk_skb: 126 callbacks suppressed Jul 2 00:48:07.673035 kernel: audit: type=1400 audit(1719881287.670:1472): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689832 kernel: audit: type=1400 audit(1719881287.671:1473): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696843 kernel: audit: type=1400 audit(1719881287.671:1474): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.711830 kernel: audit: type=1400 audit(1719881287.671:1475): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.711953 kernel: audit: type=1400 audit(1719881287.671:1476): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.718976 kernel: audit: type=1400 audit(1719881287.671:1477): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.726346 kernel: audit: type=1400 audit(1719881287.671:1478): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.733615 kernel: audit: type=1400 audit(1719881287.671:1479): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.740480 kernel: audit: type=1400 audit(1719881287.671:1480): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.747135 kernel: audit: type=1400 audit(1719881287.672:1481): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.672000 audit: BPF prog-id=193 op=LOAD Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2441 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363132643237303837326535636433356666386437643434303862 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2441 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363132643237303837326535636433356666386437643434303862 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.686000 audit: BPF prog-id=194 op=LOAD Jul 2 00:48:07.686000 audit[5682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2441 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363132643237303837326535636433356666386437643434303862 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.689000 audit: BPF prog-id=195 op=LOAD Jul 2 00:48:07.689000 audit[5682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2441 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363132643237303837326535636433356666386437643434303862 Jul 2 00:48:07.696000 audit: BPF prog-id=195 op=UNLOAD Jul 2 00:48:07.696000 audit: BPF prog-id=194 op=UNLOAD Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { perfmon } for pid=5682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit[5682]: AVC avc: denied { bpf } for pid=5682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.696000 audit: BPF prog-id=196 op=LOAD Jul 2 00:48:07.696000 audit[5682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2441 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363132643237303837326535636433356666386437643434303862 Jul 2 00:48:07.777919 env[1742]: time="2024-07-02T00:48:07.777795572Z" level=info msg="StartContainer for \"1e612d270872e5cd35ff8d7d4408b76f878c0269c7b8041324be29db88b5682d\" returns successfully" Jul 2 00:48:08.968710 kubelet[2820]: E0702 00:48:08.968656 2820 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-140?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 00:48:18.969804 kubelet[2820]: E0702 00:48:18.969740 2820 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-140?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"