Oct 2 19:14:38.649451 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:14:38.649465 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:14:38.649471 kernel: Disabled fast string operations Oct 2 19:14:38.649475 kernel: BIOS-provided physical RAM map: Oct 2 19:14:38.649479 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Oct 2 19:14:38.649483 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Oct 2 19:14:38.649489 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Oct 2 19:14:38.649493 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Oct 2 19:14:38.649497 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Oct 2 19:14:38.649501 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Oct 2 19:14:38.649505 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Oct 2 19:14:38.649509 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Oct 2 19:14:38.649513 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Oct 2 19:14:38.649518 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 2 19:14:38.649524 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Oct 2 19:14:38.649528 kernel: NX (Execute Disable) protection: active Oct 2 19:14:38.649533 kernel: SMBIOS 2.7 present. Oct 2 19:14:38.649537 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Oct 2 19:14:38.649542 kernel: vmware: hypercall mode: 0x00 Oct 2 19:14:38.649546 kernel: Hypervisor detected: VMware Oct 2 19:14:38.649551 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Oct 2 19:14:38.649556 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Oct 2 19:14:38.649560 kernel: vmware: using clock offset of 2967236576 ns Oct 2 19:14:38.649565 kernel: tsc: Detected 3408.000 MHz processor Oct 2 19:14:38.649570 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:14:38.649575 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:14:38.649579 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Oct 2 19:14:38.649584 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:14:38.649588 kernel: total RAM covered: 3072M Oct 2 19:14:38.649594 kernel: Found optimal setting for mtrr clean up Oct 2 19:14:38.649599 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Oct 2 19:14:38.649604 kernel: Using GB pages for direct mapping Oct 2 19:14:38.649608 kernel: ACPI: Early table checksum verification disabled Oct 2 19:14:38.649613 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Oct 2 19:14:38.649617 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Oct 2 19:14:38.649622 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Oct 2 19:14:38.649626 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Oct 2 19:14:38.649631 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 2 19:14:38.649635 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 2 19:14:38.649641 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Oct 2 19:14:38.649647 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Oct 2 19:14:38.649652 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Oct 2 19:14:38.649657 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Oct 2 19:14:38.649662 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Oct 2 19:14:38.649668 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Oct 2 19:14:38.649673 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Oct 2 19:14:38.649678 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Oct 2 19:14:38.649682 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 2 19:14:38.649687 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 2 19:14:38.649692 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Oct 2 19:14:38.649697 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Oct 2 19:14:38.649702 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Oct 2 19:14:38.649707 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Oct 2 19:14:38.649713 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Oct 2 19:14:38.649718 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Oct 2 19:14:38.649723 kernel: system APIC only can use physical flat Oct 2 19:14:38.649727 kernel: Setting APIC routing to physical flat. Oct 2 19:14:38.649732 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:14:38.649737 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 2 19:14:38.649742 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 2 19:14:38.649747 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 2 19:14:38.649752 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 2 19:14:38.649794 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 2 19:14:38.649799 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 2 19:14:38.649804 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 2 19:14:38.649809 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Oct 2 19:14:38.649814 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Oct 2 19:14:38.649819 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Oct 2 19:14:38.649824 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Oct 2 19:14:38.649828 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Oct 2 19:14:38.649833 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Oct 2 19:14:38.649838 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Oct 2 19:14:38.649844 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Oct 2 19:14:38.649849 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Oct 2 19:14:38.649854 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Oct 2 19:14:38.649858 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Oct 2 19:14:38.649863 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Oct 2 19:14:38.649868 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Oct 2 19:14:38.649873 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Oct 2 19:14:38.649878 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Oct 2 19:14:38.649883 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Oct 2 19:14:38.649887 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Oct 2 19:14:38.649893 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Oct 2 19:14:38.649898 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Oct 2 19:14:38.649903 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Oct 2 19:14:38.649908 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Oct 2 19:14:38.649913 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Oct 2 19:14:38.649917 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Oct 2 19:14:38.649922 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Oct 2 19:14:38.649927 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Oct 2 19:14:38.649932 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Oct 2 19:14:38.649937 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Oct 2 19:14:38.649943 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Oct 2 19:14:38.649947 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Oct 2 19:14:38.649952 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Oct 2 19:14:38.649957 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Oct 2 19:14:38.649962 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Oct 2 19:14:38.649967 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Oct 2 19:14:38.649971 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Oct 2 19:14:38.649976 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Oct 2 19:14:38.649981 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Oct 2 19:14:38.649986 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Oct 2 19:14:38.649992 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Oct 2 19:14:38.649996 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Oct 2 19:14:38.650001 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Oct 2 19:14:38.650006 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Oct 2 19:14:38.650011 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Oct 2 19:14:38.650016 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Oct 2 19:14:38.650021 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Oct 2 19:14:38.650025 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Oct 2 19:14:38.650030 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Oct 2 19:14:38.650035 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Oct 2 19:14:38.650041 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Oct 2 19:14:38.650046 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Oct 2 19:14:38.650050 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Oct 2 19:14:38.650055 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Oct 2 19:14:38.650060 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Oct 2 19:14:38.650066 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Oct 2 19:14:38.650073 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Oct 2 19:14:38.650079 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Oct 2 19:14:38.650085 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Oct 2 19:14:38.650090 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Oct 2 19:14:38.650096 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Oct 2 19:14:38.650101 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Oct 2 19:14:38.650106 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Oct 2 19:14:38.650112 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Oct 2 19:14:38.650117 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Oct 2 19:14:38.650122 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Oct 2 19:14:38.650127 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Oct 2 19:14:38.650132 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Oct 2 19:14:38.650138 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Oct 2 19:14:38.650143 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Oct 2 19:14:38.650149 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Oct 2 19:14:38.650154 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Oct 2 19:14:38.650159 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Oct 2 19:14:38.650164 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Oct 2 19:14:38.650169 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Oct 2 19:14:38.650175 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Oct 2 19:14:38.650180 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Oct 2 19:14:38.650186 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Oct 2 19:14:38.650191 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Oct 2 19:14:38.650196 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Oct 2 19:14:38.650201 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Oct 2 19:14:38.650206 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Oct 2 19:14:38.650212 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Oct 2 19:14:38.650217 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Oct 2 19:14:38.650222 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Oct 2 19:14:38.650227 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Oct 2 19:14:38.650233 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Oct 2 19:14:38.650239 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Oct 2 19:14:38.650244 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Oct 2 19:14:38.650249 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Oct 2 19:14:38.650254 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Oct 2 19:14:38.650259 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Oct 2 19:14:38.650264 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Oct 2 19:14:38.650269 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Oct 2 19:14:38.650275 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Oct 2 19:14:38.650280 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Oct 2 19:14:38.650285 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Oct 2 19:14:38.650291 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Oct 2 19:14:38.650297 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Oct 2 19:14:38.650302 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Oct 2 19:14:38.650307 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Oct 2 19:14:38.650312 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Oct 2 19:14:38.650317 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Oct 2 19:14:38.650322 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Oct 2 19:14:38.650327 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Oct 2 19:14:38.650333 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Oct 2 19:14:38.650338 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Oct 2 19:14:38.650344 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Oct 2 19:14:38.650349 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Oct 2 19:14:38.650354 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Oct 2 19:14:38.650359 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Oct 2 19:14:38.650364 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Oct 2 19:14:38.650370 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Oct 2 19:14:38.650375 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Oct 2 19:14:38.650380 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Oct 2 19:14:38.650385 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Oct 2 19:14:38.650390 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Oct 2 19:14:38.650396 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Oct 2 19:14:38.650401 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Oct 2 19:14:38.650407 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Oct 2 19:14:38.650412 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Oct 2 19:14:38.650417 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Oct 2 19:14:38.650422 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Oct 2 19:14:38.650427 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 2 19:14:38.650433 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 2 19:14:38.650438 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Oct 2 19:14:38.650444 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Oct 2 19:14:38.650450 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Oct 2 19:14:38.650455 kernel: Zone ranges: Oct 2 19:14:38.650460 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:14:38.650466 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Oct 2 19:14:38.650471 kernel: Normal empty Oct 2 19:14:38.650476 kernel: Movable zone start for each node Oct 2 19:14:38.650482 kernel: Early memory node ranges Oct 2 19:14:38.650487 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Oct 2 19:14:38.650492 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Oct 2 19:14:38.650498 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Oct 2 19:14:38.650504 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Oct 2 19:14:38.650509 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:14:38.650514 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Oct 2 19:14:38.650519 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Oct 2 19:14:38.650525 kernel: ACPI: PM-Timer IO Port: 0x1008 Oct 2 19:14:38.650530 kernel: system APIC only can use physical flat Oct 2 19:14:38.650535 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Oct 2 19:14:38.650540 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 2 19:14:38.650546 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 2 19:14:38.650552 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 2 19:14:38.650557 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 2 19:14:38.650562 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 2 19:14:38.650567 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 2 19:14:38.650573 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 2 19:14:38.650578 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 2 19:14:38.650583 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 2 19:14:38.650588 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 2 19:14:38.650594 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 2 19:14:38.650600 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 2 19:14:38.650605 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 2 19:14:38.650610 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 2 19:14:38.650615 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 2 19:14:38.650620 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 2 19:14:38.650626 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Oct 2 19:14:38.650631 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Oct 2 19:14:38.650636 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Oct 2 19:14:38.650641 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Oct 2 19:14:38.650647 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Oct 2 19:14:38.650653 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Oct 2 19:14:38.650658 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Oct 2 19:14:38.650663 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Oct 2 19:14:38.650668 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Oct 2 19:14:38.650674 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Oct 2 19:14:38.650679 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Oct 2 19:14:38.650684 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Oct 2 19:14:38.650689 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Oct 2 19:14:38.650695 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Oct 2 19:14:38.650701 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Oct 2 19:14:38.650706 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Oct 2 19:14:38.650715 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Oct 2 19:14:38.650727 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Oct 2 19:14:38.650733 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Oct 2 19:14:38.650741 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Oct 2 19:14:38.650749 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Oct 2 19:14:38.650762 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Oct 2 19:14:38.650767 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Oct 2 19:14:38.650774 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Oct 2 19:14:38.650779 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Oct 2 19:14:38.650784 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Oct 2 19:14:38.650790 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Oct 2 19:14:38.650795 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Oct 2 19:14:38.650800 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Oct 2 19:14:38.650805 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Oct 2 19:14:38.650810 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Oct 2 19:14:38.650816 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Oct 2 19:14:38.650822 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Oct 2 19:14:38.650827 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Oct 2 19:14:38.650837 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Oct 2 19:14:38.650845 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Oct 2 19:14:38.650851 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Oct 2 19:14:38.650856 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Oct 2 19:14:38.650862 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Oct 2 19:14:38.650867 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Oct 2 19:14:38.650872 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Oct 2 19:14:38.650877 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Oct 2 19:14:38.650884 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Oct 2 19:14:38.650889 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Oct 2 19:14:38.650894 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Oct 2 19:14:38.650899 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Oct 2 19:14:38.650905 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Oct 2 19:14:38.650910 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Oct 2 19:14:38.650915 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Oct 2 19:14:38.650920 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Oct 2 19:14:38.650929 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Oct 2 19:14:38.650935 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Oct 2 19:14:38.650940 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Oct 2 19:14:38.650945 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Oct 2 19:14:38.650950 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Oct 2 19:14:38.650956 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Oct 2 19:14:38.650961 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Oct 2 19:14:38.650966 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Oct 2 19:14:38.650971 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Oct 2 19:14:38.650976 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Oct 2 19:14:38.650981 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Oct 2 19:14:38.650987 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Oct 2 19:14:38.650993 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Oct 2 19:14:38.650998 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Oct 2 19:14:38.651003 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Oct 2 19:14:38.651008 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Oct 2 19:14:38.651013 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Oct 2 19:14:38.651018 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Oct 2 19:14:38.651023 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Oct 2 19:14:38.651029 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Oct 2 19:14:38.651035 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Oct 2 19:14:38.651040 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Oct 2 19:14:38.651045 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Oct 2 19:14:38.651050 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Oct 2 19:14:38.651055 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Oct 2 19:14:38.651060 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Oct 2 19:14:38.651066 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Oct 2 19:14:38.651071 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Oct 2 19:14:38.651076 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Oct 2 19:14:38.651082 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Oct 2 19:14:38.651087 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Oct 2 19:14:38.651092 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Oct 2 19:14:38.651097 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Oct 2 19:14:38.651102 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Oct 2 19:14:38.651108 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Oct 2 19:14:38.651113 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Oct 2 19:14:38.651118 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Oct 2 19:14:38.651123 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Oct 2 19:14:38.651129 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Oct 2 19:14:38.651135 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Oct 2 19:14:38.651140 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Oct 2 19:14:38.651145 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Oct 2 19:14:38.651150 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Oct 2 19:14:38.651155 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Oct 2 19:14:38.651161 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Oct 2 19:14:38.651166 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Oct 2 19:14:38.651171 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Oct 2 19:14:38.651176 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Oct 2 19:14:38.651182 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Oct 2 19:14:38.651188 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Oct 2 19:14:38.651193 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Oct 2 19:14:38.651198 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Oct 2 19:14:38.651203 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Oct 2 19:14:38.651208 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Oct 2 19:14:38.651213 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Oct 2 19:14:38.651218 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Oct 2 19:14:38.651224 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Oct 2 19:14:38.651229 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Oct 2 19:14:38.651235 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Oct 2 19:14:38.651240 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Oct 2 19:14:38.651245 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Oct 2 19:14:38.651250 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:14:38.651256 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Oct 2 19:14:38.651261 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:14:38.651266 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Oct 2 19:14:38.651271 kernel: TSC deadline timer available Oct 2 19:14:38.651276 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Oct 2 19:14:38.651283 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Oct 2 19:14:38.651288 kernel: Booting paravirtualized kernel on VMware hypervisor Oct 2 19:14:38.651293 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:14:38.651299 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Oct 2 19:14:38.651304 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Oct 2 19:14:38.651309 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Oct 2 19:14:38.651314 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Oct 2 19:14:38.651319 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Oct 2 19:14:38.651325 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Oct 2 19:14:38.651331 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Oct 2 19:14:38.651336 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Oct 2 19:14:38.651340 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Oct 2 19:14:38.651346 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Oct 2 19:14:38.651357 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Oct 2 19:14:38.651363 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Oct 2 19:14:38.651369 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Oct 2 19:14:38.651374 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Oct 2 19:14:38.651380 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Oct 2 19:14:38.651386 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Oct 2 19:14:38.651391 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Oct 2 19:14:38.651396 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Oct 2 19:14:38.651402 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Oct 2 19:14:38.651407 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Oct 2 19:14:38.651413 kernel: Policy zone: DMA32 Oct 2 19:14:38.651419 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:14:38.651426 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:14:38.651431 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Oct 2 19:14:38.651437 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Oct 2 19:14:38.651443 kernel: printk: log_buf_len min size: 262144 bytes Oct 2 19:14:38.651448 kernel: printk: log_buf_len: 1048576 bytes Oct 2 19:14:38.651454 kernel: printk: early log buf free: 239728(91%) Oct 2 19:14:38.651459 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:14:38.651465 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:14:38.651470 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:14:38.651477 kernel: Memory: 1942952K/2096628K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 153416K reserved, 0K cma-reserved) Oct 2 19:14:38.651483 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Oct 2 19:14:38.651488 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:14:38.651494 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:14:38.651500 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:14:38.651506 kernel: rcu: RCU event tracing is enabled. Oct 2 19:14:38.651513 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Oct 2 19:14:38.651519 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:14:38.651525 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:14:38.651530 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:14:38.651536 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Oct 2 19:14:38.651541 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Oct 2 19:14:38.651547 kernel: random: crng init done Oct 2 19:14:38.651552 kernel: Console: colour VGA+ 80x25 Oct 2 19:14:38.651558 kernel: printk: console [tty0] enabled Oct 2 19:14:38.651564 kernel: printk: console [ttyS0] enabled Oct 2 19:14:38.651570 kernel: ACPI: Core revision 20210730 Oct 2 19:14:38.651576 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Oct 2 19:14:38.651582 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:14:38.651591 kernel: x2apic enabled Oct 2 19:14:38.651603 kernel: Switched APIC routing to physical x2apic. Oct 2 19:14:38.651609 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 2 19:14:38.651619 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 2 19:14:38.651625 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Oct 2 19:14:38.651632 kernel: Disabled fast string operations Oct 2 19:14:38.651637 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:14:38.651645 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:14:38.651651 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:14:38.651658 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 2 19:14:38.651664 kernel: Spectre V2 : Mitigation: Enhanced IBRS Oct 2 19:14:38.651670 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:14:38.651675 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 2 19:14:38.651681 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 2 19:14:38.651688 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:14:38.651693 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:14:38.651699 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:14:38.651705 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 2 19:14:38.651710 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:14:38.651716 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:14:38.651722 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:14:38.651727 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:14:38.651733 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:14:38.651739 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 2 19:14:38.651745 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:14:38.651750 kernel: pid_max: default: 131072 minimum: 1024 Oct 2 19:14:38.651765 kernel: LSM: Security Framework initializing Oct 2 19:14:38.651772 kernel: SELinux: Initializing. Oct 2 19:14:38.651777 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:14:38.651783 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:14:38.651789 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 2 19:14:38.651796 kernel: Performance Events: Skylake events, core PMU driver. Oct 2 19:14:38.651802 kernel: core: CPUID marked event: 'cpu cycles' unavailable Oct 2 19:14:38.651807 kernel: core: CPUID marked event: 'instructions' unavailable Oct 2 19:14:38.651813 kernel: core: CPUID marked event: 'bus cycles' unavailable Oct 2 19:14:38.651818 kernel: core: CPUID marked event: 'cache references' unavailable Oct 2 19:14:38.651824 kernel: core: CPUID marked event: 'cache misses' unavailable Oct 2 19:14:38.651829 kernel: core: CPUID marked event: 'branch instructions' unavailable Oct 2 19:14:38.651835 kernel: core: CPUID marked event: 'branch misses' unavailable Oct 2 19:14:38.651840 kernel: ... version: 1 Oct 2 19:14:38.651847 kernel: ... bit width: 48 Oct 2 19:14:38.651853 kernel: ... generic registers: 4 Oct 2 19:14:38.651858 kernel: ... value mask: 0000ffffffffffff Oct 2 19:14:38.651864 kernel: ... max period: 000000007fffffff Oct 2 19:14:38.651870 kernel: ... fixed-purpose events: 0 Oct 2 19:14:38.651875 kernel: ... event mask: 000000000000000f Oct 2 19:14:38.651881 kernel: signal: max sigframe size: 1776 Oct 2 19:14:38.651886 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:14:38.651892 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:14:38.651899 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:14:38.651904 kernel: x86: Booting SMP configuration: Oct 2 19:14:38.651910 kernel: .... node #0, CPUs: #1 Oct 2 19:14:38.651915 kernel: Disabled fast string operations Oct 2 19:14:38.651921 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Oct 2 19:14:38.651926 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 2 19:14:38.651932 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:14:38.651937 kernel: smpboot: Max logical packages: 128 Oct 2 19:14:38.651943 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Oct 2 19:14:38.651949 kernel: devtmpfs: initialized Oct 2 19:14:38.651956 kernel: x86/mm: Memory block size: 128MB Oct 2 19:14:38.651962 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Oct 2 19:14:38.651967 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:14:38.651973 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Oct 2 19:14:38.651979 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:14:38.651984 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:14:38.651990 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:14:38.651995 kernel: audit: type=2000 audit(1696274077.058:1): state=initialized audit_enabled=0 res=1 Oct 2 19:14:38.652001 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:14:38.652008 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:14:38.652014 kernel: cpuidle: using governor menu Oct 2 19:14:38.652019 kernel: Simple Boot Flag at 0x36 set to 0x80 Oct 2 19:14:38.652025 kernel: ACPI: bus type PCI registered Oct 2 19:14:38.652030 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:14:38.652036 kernel: dca service started, version 1.12.1 Oct 2 19:14:38.652042 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Oct 2 19:14:38.652048 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Oct 2 19:14:38.652053 kernel: PCI: Using configuration type 1 for base access Oct 2 19:14:38.652060 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:14:38.652065 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:14:38.652071 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:14:38.652077 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:14:38.652082 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:14:38.652088 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:14:38.652093 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:14:38.652099 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:14:38.652104 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:14:38.652111 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:14:38.652116 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:14:38.652122 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Oct 2 19:14:38.652128 kernel: ACPI: Interpreter enabled Oct 2 19:14:38.652133 kernel: ACPI: PM: (supports S0 S1 S5) Oct 2 19:14:38.652139 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:14:38.652144 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:14:38.652150 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Oct 2 19:14:38.652156 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Oct 2 19:14:38.652249 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:14:38.652301 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Oct 2 19:14:38.652345 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Oct 2 19:14:38.652353 kernel: PCI host bridge to bus 0000:00 Oct 2 19:14:38.652399 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:14:38.652440 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Oct 2 19:14:38.652483 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Oct 2 19:14:38.652522 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Oct 2 19:14:38.652561 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Oct 2 19:14:38.652599 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 2 19:14:38.652638 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:14:38.652678 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Oct 2 19:14:38.652716 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Oct 2 19:14:38.655821 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Oct 2 19:14:38.655887 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Oct 2 19:14:38.655941 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Oct 2 19:14:38.655993 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Oct 2 19:14:38.656039 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Oct 2 19:14:38.656085 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 2 19:14:38.656131 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 2 19:14:38.656179 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 2 19:14:38.656223 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 2 19:14:38.656276 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Oct 2 19:14:38.656321 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Oct 2 19:14:38.656366 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Oct 2 19:14:38.656414 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Oct 2 19:14:38.656462 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Oct 2 19:14:38.656506 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Oct 2 19:14:38.656555 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Oct 2 19:14:38.656600 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Oct 2 19:14:38.656645 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Oct 2 19:14:38.656690 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Oct 2 19:14:38.656734 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Oct 2 19:14:38.656802 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:14:38.656853 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Oct 2 19:14:38.656907 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.656959 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.657009 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.657057 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.657111 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.657161 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.657210 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.657256 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.657308 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.657354 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.657404 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.657453 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.657503 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.657550 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.657599 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.657645 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.657695 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.657742 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.673738 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.673876 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.673933 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.673981 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674036 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674084 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674134 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674182 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674234 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674280 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674332 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674379 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674428 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674474 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674523 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674569 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674622 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674668 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674717 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674776 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674830 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674876 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.674926 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.674975 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675027 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675072 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675122 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675169 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675217 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675267 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675317 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675363 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675412 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675459 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675509 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675558 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675606 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675652 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675701 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675747 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675844 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.675903 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.675957 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.676006 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.676057 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Oct 2 19:14:38.676105 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.676157 kernel: pci_bus 0000:01: extended config space not accessible Oct 2 19:14:38.676209 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 19:14:38.676263 kernel: pci_bus 0000:02: extended config space not accessible Oct 2 19:14:38.676272 kernel: acpiphp: Slot [32] registered Oct 2 19:14:38.676278 kernel: acpiphp: Slot [33] registered Oct 2 19:14:38.676284 kernel: acpiphp: Slot [34] registered Oct 2 19:14:38.676290 kernel: acpiphp: Slot [35] registered Oct 2 19:14:38.676296 kernel: acpiphp: Slot [36] registered Oct 2 19:14:38.676301 kernel: acpiphp: Slot [37] registered Oct 2 19:14:38.676307 kernel: acpiphp: Slot [38] registered Oct 2 19:14:38.676314 kernel: acpiphp: Slot [39] registered Oct 2 19:14:38.676320 kernel: acpiphp: Slot [40] registered Oct 2 19:14:38.676326 kernel: acpiphp: Slot [41] registered Oct 2 19:14:38.676332 kernel: acpiphp: Slot [42] registered Oct 2 19:14:38.676337 kernel: acpiphp: Slot [43] registered Oct 2 19:14:38.676343 kernel: acpiphp: Slot [44] registered Oct 2 19:14:38.676349 kernel: acpiphp: Slot [45] registered Oct 2 19:14:38.676354 kernel: acpiphp: Slot [46] registered Oct 2 19:14:38.676360 kernel: acpiphp: Slot [47] registered Oct 2 19:14:38.676366 kernel: acpiphp: Slot [48] registered Oct 2 19:14:38.676373 kernel: acpiphp: Slot [49] registered Oct 2 19:14:38.676379 kernel: acpiphp: Slot [50] registered Oct 2 19:14:38.676384 kernel: acpiphp: Slot [51] registered Oct 2 19:14:38.676390 kernel: acpiphp: Slot [52] registered Oct 2 19:14:38.676396 kernel: acpiphp: Slot [53] registered Oct 2 19:14:38.676402 kernel: acpiphp: Slot [54] registered Oct 2 19:14:38.676407 kernel: acpiphp: Slot [55] registered Oct 2 19:14:38.676413 kernel: acpiphp: Slot [56] registered Oct 2 19:14:38.676419 kernel: acpiphp: Slot [57] registered Oct 2 19:14:38.676426 kernel: acpiphp: Slot [58] registered Oct 2 19:14:38.676431 kernel: acpiphp: Slot [59] registered Oct 2 19:14:38.676437 kernel: acpiphp: Slot [60] registered Oct 2 19:14:38.676442 kernel: acpiphp: Slot [61] registered Oct 2 19:14:38.676448 kernel: acpiphp: Slot [62] registered Oct 2 19:14:38.676454 kernel: acpiphp: Slot [63] registered Oct 2 19:14:38.676502 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Oct 2 19:14:38.676551 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 2 19:14:38.676596 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 2 19:14:38.676646 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 2 19:14:38.676692 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Oct 2 19:14:38.676738 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Oct 2 19:14:38.676796 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Oct 2 19:14:38.676842 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Oct 2 19:14:38.676889 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Oct 2 19:14:38.676935 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Oct 2 19:14:38.676984 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Oct 2 19:14:38.677029 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Oct 2 19:14:38.677083 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Oct 2 19:14:38.677133 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Oct 2 19:14:38.677180 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Oct 2 19:14:38.677228 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 2 19:14:38.677276 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 2 19:14:38.677323 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 2 19:14:38.677375 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 2 19:14:38.677422 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 2 19:14:38.677470 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 2 19:14:38.677519 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 2 19:14:38.677567 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 2 19:14:38.677613 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 2 19:14:38.677660 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 2 19:14:38.677712 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 2 19:14:38.677768 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 2 19:14:38.677816 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 2 19:14:38.677867 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 2 19:14:38.677920 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 2 19:14:38.677980 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 2 19:14:38.678032 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 2 19:14:38.678086 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 2 19:14:38.678133 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 2 19:14:38.678180 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 2 19:14:38.678228 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 2 19:14:38.678274 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 2 19:14:38.678324 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 2 19:14:38.678373 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 2 19:14:38.678420 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 2 19:14:38.678466 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 2 19:14:38.678514 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 2 19:14:38.678562 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 2 19:14:38.678608 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 2 19:14:38.678662 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Oct 2 19:14:38.678713 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Oct 2 19:14:38.678770 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Oct 2 19:14:38.678819 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Oct 2 19:14:38.678866 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Oct 2 19:14:38.678913 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 2 19:14:38.678962 kernel: pci 0000:0b:00.0: supports D1 D2 Oct 2 19:14:38.679009 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 19:14:38.679057 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 2 19:14:38.679104 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 2 19:14:38.679151 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 2 19:14:38.679197 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 2 19:14:38.679245 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 2 19:14:38.679291 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 2 19:14:38.679336 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 2 19:14:38.679382 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 2 19:14:38.679432 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 2 19:14:38.679478 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 2 19:14:38.679525 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 2 19:14:38.679570 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 2 19:14:38.679618 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 2 19:14:38.679665 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 2 19:14:38.679711 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 2 19:14:38.679764 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 2 19:14:38.679814 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 2 19:14:38.679860 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 2 19:14:38.679909 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 2 19:14:38.679957 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 2 19:14:38.680003 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 2 19:14:38.680050 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 2 19:14:38.680096 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 2 19:14:38.680141 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 2 19:14:38.680191 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 2 19:14:38.680236 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 2 19:14:38.680282 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 2 19:14:38.680330 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 2 19:14:38.680376 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 2 19:14:38.680421 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 2 19:14:38.680467 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 2 19:14:38.680515 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 2 19:14:38.680563 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 2 19:14:38.680609 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 2 19:14:38.680655 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 2 19:14:38.680704 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 2 19:14:38.680749 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 2 19:14:38.685342 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 2 19:14:38.685403 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 2 19:14:38.685461 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 2 19:14:38.685510 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 2 19:14:38.685556 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 2 19:14:38.685604 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 2 19:14:38.685650 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 2 19:14:38.685696 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 2 19:14:38.685744 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 2 19:14:38.685939 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 2 19:14:38.685990 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 2 19:14:38.686037 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 2 19:14:38.686084 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 2 19:14:38.686130 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 2 19:14:38.686177 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 2 19:14:38.686222 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 2 19:14:38.686267 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 2 19:14:38.686314 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 2 19:14:38.686362 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 2 19:14:38.686408 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 2 19:14:38.686453 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 2 19:14:38.686500 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 2 19:14:38.686546 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 2 19:14:38.686591 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 2 19:14:38.686637 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 2 19:14:38.686683 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 2 19:14:38.686732 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 2 19:14:38.686784 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 2 19:14:38.686832 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 2 19:14:38.686876 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 2 19:14:38.686926 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 2 19:14:38.686974 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 2 19:14:38.687019 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 2 19:14:38.687064 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 2 19:14:38.687116 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 2 19:14:38.687161 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 2 19:14:38.687206 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 2 19:14:38.687271 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 2 19:14:38.687319 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 2 19:14:38.687364 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 2 19:14:38.687411 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 2 19:14:38.687456 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 2 19:14:38.687510 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 2 19:14:38.687518 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Oct 2 19:14:38.687525 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Oct 2 19:14:38.687531 kernel: ACPI: PCI: Interrupt link LNKB disabled Oct 2 19:14:38.687537 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:14:38.687543 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Oct 2 19:14:38.687549 kernel: iommu: Default domain type: Translated Oct 2 19:14:38.687555 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:14:38.688326 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Oct 2 19:14:38.688382 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:14:38.688429 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Oct 2 19:14:38.688438 kernel: vgaarb: loaded Oct 2 19:14:38.688445 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:14:38.688451 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:14:38.688457 kernel: PTP clock support registered Oct 2 19:14:38.688463 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:14:38.688469 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:14:38.688477 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Oct 2 19:14:38.688483 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Oct 2 19:14:38.688488 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Oct 2 19:14:38.688494 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Oct 2 19:14:38.688500 kernel: clocksource: Switched to clocksource tsc-early Oct 2 19:14:38.688506 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:14:38.688512 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:14:38.688518 kernel: pnp: PnP ACPI init Oct 2 19:14:38.688576 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Oct 2 19:14:38.688622 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Oct 2 19:14:38.688665 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Oct 2 19:14:38.688709 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Oct 2 19:14:38.688763 kernel: pnp 00:06: [dma 2] Oct 2 19:14:38.688816 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Oct 2 19:14:38.688859 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Oct 2 19:14:38.688903 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Oct 2 19:14:38.688911 kernel: pnp: PnP ACPI: found 8 devices Oct 2 19:14:38.688917 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:14:38.688923 kernel: NET: Registered PF_INET protocol family Oct 2 19:14:38.688929 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:14:38.688935 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:14:38.688941 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:14:38.688947 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:14:38.688953 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:14:38.688960 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:14:38.688966 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:14:38.688972 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:14:38.688977 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:14:38.688984 kernel: NET: Registered PF_XDP protocol family Oct 2 19:14:38.689077 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Oct 2 19:14:38.689168 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 2 19:14:38.689461 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 2 19:14:38.689540 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 2 19:14:38.689626 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 2 19:14:38.689678 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Oct 2 19:14:38.689727 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Oct 2 19:14:38.689790 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Oct 2 19:14:38.689844 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Oct 2 19:14:38.689893 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Oct 2 19:14:38.689945 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Oct 2 19:14:38.689993 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Oct 2 19:14:38.690041 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Oct 2 19:14:38.690089 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Oct 2 19:14:38.690139 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Oct 2 19:14:38.690186 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Oct 2 19:14:38.690233 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Oct 2 19:14:38.690280 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Oct 2 19:14:38.690339 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Oct 2 19:14:38.690388 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Oct 2 19:14:38.690438 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Oct 2 19:14:38.690485 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Oct 2 19:14:38.690533 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Oct 2 19:14:38.690581 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Oct 2 19:14:38.690627 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Oct 2 19:14:38.690674 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.690722 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.690777 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.690825 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.690871 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.690918 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.690964 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691009 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691055 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691101 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691149 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691194 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691241 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691286 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691333 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691379 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691426 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691472 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691520 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691565 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691612 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691658 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691705 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691750 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691810 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691857 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.691906 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.691955 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692002 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692048 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692093 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692139 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692184 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692229 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692278 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692322 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692368 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692413 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692459 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692505 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692551 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692597 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692645 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692690 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692737 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692794 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692859 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692905 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.692951 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.692998 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.693065 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.693117 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.693165 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.693210 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.695010 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.695069 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.695119 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.695458 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.695512 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.695561 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.695609 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.695660 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.695709 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.695892 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.695946 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.696277 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.696333 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.696382 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.696430 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.696476 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.696525 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.696572 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.696618 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.696664 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.696711 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.696783 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.696833 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.696880 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.696927 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.697257 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.697314 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.697362 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.698533 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 2 19:14:38.698593 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:14:38.698645 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 19:14:38.698978 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Oct 2 19:14:38.699029 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 2 19:14:38.699076 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 2 19:14:38.699131 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 2 19:14:38.699184 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Oct 2 19:14:38.699234 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 2 19:14:38.699280 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 2 19:14:38.699326 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 2 19:14:38.699373 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Oct 2 19:14:38.699421 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 2 19:14:38.699467 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 2 19:14:38.699512 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 2 19:14:38.699560 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 2 19:14:38.699608 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 2 19:14:38.699653 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 2 19:14:38.699698 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 2 19:14:38.699743 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 2 19:14:38.700022 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 2 19:14:38.700080 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 2 19:14:38.700129 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 2 19:14:38.700180 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 2 19:14:38.700227 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 2 19:14:38.700273 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 2 19:14:38.700320 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 2 19:14:38.700365 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 2 19:14:38.700410 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 2 19:14:38.700456 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 2 19:14:38.700504 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 2 19:14:38.700550 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 2 19:14:38.700596 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 2 19:14:38.700642 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 2 19:14:38.700687 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 2 19:14:38.700737 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Oct 2 19:14:38.701105 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 2 19:14:38.701158 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 2 19:14:38.701208 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 2 19:14:38.701255 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Oct 2 19:14:38.701306 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 2 19:14:38.701353 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 2 19:14:38.701399 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 2 19:14:38.701445 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 2 19:14:38.701780 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 2 19:14:38.701838 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 2 19:14:38.701887 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 2 19:14:38.701934 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 2 19:14:38.701982 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 2 19:14:38.702031 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 2 19:14:38.702077 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 2 19:14:38.702125 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 2 19:14:38.702172 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 2 19:14:38.702217 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 2 19:14:38.702265 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 2 19:14:38.702311 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 2 19:14:38.702357 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 2 19:14:38.702420 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 2 19:14:38.702505 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 2 19:14:38.702972 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 2 19:14:38.703032 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 2 19:14:38.703103 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 2 19:14:38.703294 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 2 19:14:38.703348 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 2 19:14:38.703396 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 2 19:14:38.703442 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 2 19:14:38.703488 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 2 19:14:38.703535 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 2 19:14:38.703583 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 2 19:14:38.703629 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 2 19:14:38.703674 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 2 19:14:38.703721 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 2 19:14:38.703779 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 2 19:14:38.703827 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 2 19:14:38.703873 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 2 19:14:38.703920 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 2 19:14:38.703967 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 2 19:14:38.704017 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 2 19:14:38.704066 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 2 19:14:38.704113 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 2 19:14:38.704160 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 2 19:14:38.704206 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 2 19:14:38.704252 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 2 19:14:38.704298 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 2 19:14:38.704345 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 2 19:14:38.704391 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 2 19:14:38.704437 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 2 19:14:38.704486 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 2 19:14:38.704531 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 2 19:14:38.704577 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 2 19:14:38.704638 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 2 19:14:38.704687 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 2 19:14:38.704733 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 2 19:14:38.705097 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 2 19:14:38.705153 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 2 19:14:38.705201 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 2 19:14:38.705250 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 2 19:14:38.705297 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 2 19:14:38.705344 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 2 19:14:38.705389 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 2 19:14:38.705435 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 2 19:14:38.705482 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 2 19:14:38.705527 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 2 19:14:38.705573 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 2 19:14:38.705914 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 2 19:14:38.705964 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 2 19:14:38.706014 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 2 19:14:38.706062 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 2 19:14:38.706108 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 2 19:14:38.706153 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 2 19:14:38.706200 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 2 19:14:38.706246 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 2 19:14:38.706292 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 2 19:14:38.706338 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 2 19:14:38.706383 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 2 19:14:38.706431 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 2 19:14:38.706477 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Oct 2 19:14:38.706518 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Oct 2 19:14:38.706558 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Oct 2 19:14:38.706598 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Oct 2 19:14:38.706646 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Oct 2 19:14:38.706688 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Oct 2 19:14:38.706731 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Oct 2 19:14:38.707115 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Oct 2 19:14:38.707169 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Oct 2 19:14:38.707214 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Oct 2 19:14:38.707256 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 2 19:14:38.707572 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Oct 2 19:14:38.707619 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Oct 2 19:14:38.707661 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Oct 2 19:14:38.707841 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Oct 2 19:14:38.707897 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Oct 2 19:14:38.707947 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Oct 2 19:14:38.707990 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Oct 2 19:14:38.708301 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Oct 2 19:14:38.708356 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Oct 2 19:14:38.708401 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Oct 2 19:14:38.708446 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Oct 2 19:14:38.708492 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Oct 2 19:14:38.708536 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Oct 2 19:14:38.708577 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Oct 2 19:14:38.708625 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Oct 2 19:14:38.708667 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Oct 2 19:14:38.708709 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Oct 2 19:14:38.708787 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Oct 2 19:14:38.708834 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Oct 2 19:14:38.708879 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Oct 2 19:14:38.708922 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 2 19:14:38.708971 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Oct 2 19:14:38.709022 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Oct 2 19:14:38.709070 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Oct 2 19:14:38.709113 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Oct 2 19:14:38.709158 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Oct 2 19:14:38.709201 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Oct 2 19:14:38.709273 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Oct 2 19:14:38.709347 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Oct 2 19:14:38.709394 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Oct 2 19:14:38.709442 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Oct 2 19:14:38.709485 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Oct 2 19:14:38.709527 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Oct 2 19:14:38.709870 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Oct 2 19:14:38.709918 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Oct 2 19:14:38.709965 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Oct 2 19:14:38.710015 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Oct 2 19:14:38.710059 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 2 19:14:38.710105 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Oct 2 19:14:38.710148 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 2 19:14:38.710195 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Oct 2 19:14:38.710237 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Oct 2 19:14:38.710289 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Oct 2 19:14:38.710333 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Oct 2 19:14:38.710379 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Oct 2 19:14:38.710422 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 2 19:14:38.710468 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Oct 2 19:14:38.710510 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Oct 2 19:14:38.710555 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 2 19:14:38.710601 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Oct 2 19:14:38.710644 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Oct 2 19:14:38.710687 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Oct 2 19:14:38.710733 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Oct 2 19:14:38.710798 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Oct 2 19:14:38.710841 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Oct 2 19:14:38.711076 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Oct 2 19:14:38.711124 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 2 19:14:38.711173 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Oct 2 19:14:38.711216 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 2 19:14:38.711263 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Oct 2 19:14:38.711306 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Oct 2 19:14:38.711355 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Oct 2 19:14:38.711399 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Oct 2 19:14:38.711449 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Oct 2 19:14:38.711492 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 2 19:14:38.711537 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Oct 2 19:14:38.711580 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Oct 2 19:14:38.711646 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Oct 2 19:14:38.711800 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Oct 2 19:14:38.711849 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Oct 2 19:14:38.711892 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Oct 2 19:14:38.711939 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Oct 2 19:14:38.711983 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Oct 2 19:14:38.712032 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Oct 2 19:14:38.712078 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 2 19:14:38.712125 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Oct 2 19:14:38.712168 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Oct 2 19:14:38.712216 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Oct 2 19:14:38.712259 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Oct 2 19:14:38.712305 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Oct 2 19:14:38.712372 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Oct 2 19:14:38.712538 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Oct 2 19:14:38.712586 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 2 19:14:38.712637 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:14:38.712647 kernel: PCI: CLS 32 bytes, default 64 Oct 2 19:14:38.712653 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:14:38.712662 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 2 19:14:38.712669 kernel: clocksource: Switched to clocksource tsc Oct 2 19:14:38.712675 kernel: Initialise system trusted keyrings Oct 2 19:14:38.712681 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:14:38.712688 kernel: Key type asymmetric registered Oct 2 19:14:38.712694 kernel: Asymmetric key parser 'x509' registered Oct 2 19:14:38.712700 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:14:38.712706 kernel: io scheduler mq-deadline registered Oct 2 19:14:38.712712 kernel: io scheduler kyber registered Oct 2 19:14:38.712718 kernel: io scheduler bfq registered Oct 2 19:14:38.712800 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Oct 2 19:14:38.712850 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.712899 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Oct 2 19:14:38.712946 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.712994 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Oct 2 19:14:38.713042 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.713089 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Oct 2 19:14:38.713273 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.713326 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Oct 2 19:14:38.713374 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.713422 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Oct 2 19:14:38.713469 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.713519 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Oct 2 19:14:38.713566 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.713613 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Oct 2 19:14:38.713660 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.713707 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Oct 2 19:14:38.713759 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.713839 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Oct 2 19:14:38.713888 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.713935 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Oct 2 19:14:38.713982 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714029 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Oct 2 19:14:38.714086 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714134 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Oct 2 19:14:38.714225 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714275 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Oct 2 19:14:38.714322 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714368 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Oct 2 19:14:38.714415 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714481 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Oct 2 19:14:38.714527 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714574 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Oct 2 19:14:38.714620 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714665 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Oct 2 19:14:38.714711 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714802 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Oct 2 19:14:38.714852 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714898 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Oct 2 19:14:38.714944 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.714990 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Oct 2 19:14:38.715036 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.715085 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Oct 2 19:14:38.715130 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.715184 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Oct 2 19:14:38.715231 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.715278 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Oct 2 19:14:38.715325 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.716023 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Oct 2 19:14:38.716078 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.718593 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Oct 2 19:14:38.718656 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.718707 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Oct 2 19:14:38.718803 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.718858 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Oct 2 19:14:38.718905 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.718951 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Oct 2 19:14:38.719134 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.719185 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Oct 2 19:14:38.719235 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.719283 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Oct 2 19:14:38.719329 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.719377 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Oct 2 19:14:38.719423 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:14:38.719434 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:14:38.719440 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:14:38.719447 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:14:38.719453 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Oct 2 19:14:38.719460 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:14:38.719466 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:14:38.719516 kernel: rtc_cmos 00:01: registered as rtc0 Oct 2 19:14:38.719560 kernel: rtc_cmos 00:01: setting system clock to 2023-10-02T19:14:38 UTC (1696274078) Oct 2 19:14:38.719605 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Oct 2 19:14:38.719614 kernel: fail to initialize ptp_kvm Oct 2 19:14:38.719621 kernel: intel_pstate: CPU model not supported Oct 2 19:14:38.719627 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:14:38.719633 kernel: Segment Routing with IPv6 Oct 2 19:14:38.719639 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:14:38.719646 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:14:38.719652 kernel: Key type dns_resolver registered Oct 2 19:14:38.719658 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:14:38.719666 kernel: IPI shorthand broadcast: enabled Oct 2 19:14:38.719672 kernel: sched_clock: Marking stable (841289647, 222604911)->(1129156192, -65261634) Oct 2 19:14:38.719678 kernel: registered taskstats version 1 Oct 2 19:14:38.719684 kernel: Loading compiled-in X.509 certificates Oct 2 19:14:38.719691 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:14:38.719697 kernel: Key type .fscrypt registered Oct 2 19:14:38.719703 kernel: Key type fscrypt-provisioning registered Oct 2 19:14:38.719709 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:14:38.719715 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:14:38.719998 kernel: ima: No architecture policies found Oct 2 19:14:38.720007 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:14:38.720013 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:14:38.720019 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:14:38.720025 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:14:38.720032 kernel: Run /init as init process Oct 2 19:14:38.720038 kernel: with arguments: Oct 2 19:14:38.720044 kernel: /init Oct 2 19:14:38.720050 kernel: with environment: Oct 2 19:14:38.720059 kernel: HOME=/ Oct 2 19:14:38.720065 kernel: TERM=linux Oct 2 19:14:38.720071 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:14:38.720078 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:14:38.720086 systemd[1]: Detected virtualization vmware. Oct 2 19:14:38.720093 systemd[1]: Detected architecture x86-64. Oct 2 19:14:38.720099 systemd[1]: Running in initrd. Oct 2 19:14:38.720105 systemd[1]: No hostname configured, using default hostname. Oct 2 19:14:38.720113 systemd[1]: Hostname set to . Oct 2 19:14:38.720119 systemd[1]: Initializing machine ID from random generator. Oct 2 19:14:38.720126 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:14:38.720132 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:14:38.720138 systemd[1]: Reached target cryptsetup.target. Oct 2 19:14:38.720145 systemd[1]: Reached target paths.target. Oct 2 19:14:38.720152 systemd[1]: Reached target slices.target. Oct 2 19:14:38.720158 systemd[1]: Reached target swap.target. Oct 2 19:14:38.720164 systemd[1]: Reached target timers.target. Oct 2 19:14:38.720171 systemd[1]: Listening on iscsid.socket. Oct 2 19:14:38.720178 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:14:38.720184 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:14:38.720190 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:14:38.720197 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:14:38.720203 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:14:38.720443 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:14:38.720452 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:14:38.720458 systemd[1]: Reached target sockets.target. Oct 2 19:14:38.720465 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:14:38.720471 systemd[1]: Finished network-cleanup.service. Oct 2 19:14:38.720478 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:14:38.720484 systemd[1]: Starting systemd-journald.service... Oct 2 19:14:38.720505 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:14:38.720512 systemd[1]: Starting systemd-resolved.service... Oct 2 19:14:38.720518 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:14:38.720526 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:14:38.720532 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:14:38.720539 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:14:38.720545 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:14:38.720552 kernel: audit: type=1130 audit(1696274078.656:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.720558 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:14:38.720565 kernel: audit: type=1130 audit(1696274078.662:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.720571 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:14:38.720579 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:14:38.720585 kernel: Bridge firewalling registered Oct 2 19:14:38.720591 systemd[1]: Started systemd-resolved.service. Oct 2 19:14:38.720598 kernel: audit: type=1130 audit(1696274078.679:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.720604 systemd[1]: Reached target nss-lookup.target. Oct 2 19:14:38.720610 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:14:38.720617 kernel: audit: type=1130 audit(1696274078.689:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.720623 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:14:38.720631 kernel: SCSI subsystem initialized Oct 2 19:14:38.720637 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:14:38.720644 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:14:38.720650 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:14:38.720657 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:14:38.720665 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:14:38.720671 kernel: audit: type=1130 audit(1696274078.713:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.720678 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:14:38.720687 systemd-journald[216]: Journal started Oct 2 19:14:38.720720 systemd-journald[216]: Runtime Journal (/run/log/journal/746128858f584f1586d4bcf7cfea0e89) is 4.8M, max 38.8M, 34.0M free. Oct 2 19:14:38.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.650857 systemd-modules-load[217]: Inserted module 'overlay' Oct 2 19:14:38.671527 systemd-resolved[218]: Positive Trust Anchors: Oct 2 19:14:38.725556 systemd[1]: Started systemd-journald.service. Oct 2 19:14:38.725568 kernel: audit: type=1130 audit(1696274078.720:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.671533 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:14:38.728203 kernel: audit: type=1130 audit(1696274078.723:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.671554 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:14:38.672211 systemd-modules-load[217]: Inserted module 'br_netfilter' Oct 2 19:14:38.673203 systemd-resolved[218]: Defaulting to hostname 'linux'. Oct 2 19:14:38.713810 systemd-modules-load[217]: Inserted module 'dm_multipath' Oct 2 19:14:38.729226 dracut-cmdline[232]: dracut-dracut-053 Oct 2 19:14:38.729226 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 2 19:14:38.729226 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:14:38.747768 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:14:38.754769 kernel: iscsi: registered transport (tcp) Oct 2 19:14:38.768081 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:14:38.768106 kernel: QLogic iSCSI HBA Driver Oct 2 19:14:38.784133 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:14:38.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.784730 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:14:38.787788 kernel: audit: type=1130 audit(1696274078.782:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:38.832771 kernel: raid6: avx2x4 gen() 48540 MB/s Oct 2 19:14:38.837766 kernel: raid6: avx2x4 xor() 22114 MB/s Oct 2 19:14:38.854796 kernel: raid6: avx2x2 gen() 53270 MB/s Oct 2 19:14:38.871794 kernel: raid6: avx2x2 xor() 32266 MB/s Oct 2 19:14:38.888767 kernel: raid6: avx2x1 gen() 44144 MB/s Oct 2 19:14:38.905799 kernel: raid6: avx2x1 xor() 27468 MB/s Oct 2 19:14:38.922796 kernel: raid6: sse2x4 gen() 20923 MB/s Oct 2 19:14:38.939765 kernel: raid6: sse2x4 xor() 11885 MB/s Oct 2 19:14:38.956769 kernel: raid6: sse2x2 gen() 21380 MB/s Oct 2 19:14:38.973769 kernel: raid6: sse2x2 xor() 13331 MB/s Oct 2 19:14:38.990771 kernel: raid6: sse2x1 gen() 18074 MB/s Oct 2 19:14:39.008002 kernel: raid6: sse2x1 xor() 8619 MB/s Oct 2 19:14:39.008041 kernel: raid6: using algorithm avx2x2 gen() 53270 MB/s Oct 2 19:14:39.008049 kernel: raid6: .... xor() 32266 MB/s, rmw enabled Oct 2 19:14:39.009168 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:14:39.017767 kernel: xor: automatically using best checksumming function avx Oct 2 19:14:39.076772 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:14:39.081344 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:14:39.081963 systemd[1]: Starting systemd-udevd.service... Oct 2 19:14:39.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:39.084768 kernel: audit: type=1130 audit(1696274079.079:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:39.079000 audit: BPF prog-id=7 op=LOAD Oct 2 19:14:39.079000 audit: BPF prog-id=8 op=LOAD Oct 2 19:14:39.092184 systemd-udevd[415]: Using default interface naming scheme 'v252'. Oct 2 19:14:39.094739 systemd[1]: Started systemd-udevd.service. Oct 2 19:14:39.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:39.095255 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:14:39.103492 dracut-pre-trigger[416]: rd.md=0: removing MD RAID activation Oct 2 19:14:39.120372 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:14:39.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:39.120909 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:14:39.181267 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:14:39.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:39.230767 kernel: VMware PVSCSI driver - version 1.0.7.0-k Oct 2 19:14:39.234061 kernel: vmw_pvscsi: using 64bit dma Oct 2 19:14:39.234087 kernel: vmw_pvscsi: max_id: 16 Oct 2 19:14:39.234096 kernel: vmw_pvscsi: setting ring_pages to 8 Oct 2 19:14:39.249735 kernel: vmw_pvscsi: enabling reqCallThreshold Oct 2 19:14:39.249765 kernel: vmw_pvscsi: driver-based request coalescing enabled Oct 2 19:14:39.249774 kernel: vmw_pvscsi: using MSI-X Oct 2 19:14:39.249781 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Oct 2 19:14:39.249860 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Oct 2 19:14:39.251705 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Oct 2 19:14:39.254764 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Oct 2 19:14:39.259374 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:14:39.259395 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Oct 2 19:14:39.266768 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Oct 2 19:14:39.268767 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Oct 2 19:14:39.272415 kernel: libata version 3.00 loaded. Oct 2 19:14:39.273774 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:14:39.273791 kernel: AES CTR mode by8 optimization enabled Oct 2 19:14:39.273798 kernel: ata_piix 0000:00:07.1: version 2.13 Oct 2 19:14:39.280815 kernel: scsi host1: ata_piix Oct 2 19:14:39.281767 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Oct 2 19:14:39.281853 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 19:14:39.281913 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Oct 2 19:14:39.281972 kernel: sd 0:0:0:0: [sda] Cache data unavailable Oct 2 19:14:39.282032 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Oct 2 19:14:39.283767 kernel: scsi host2: ata_piix Oct 2 19:14:39.283846 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Oct 2 19:14:39.283855 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Oct 2 19:14:39.286762 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:14:39.286782 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 19:14:39.456816 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Oct 2 19:14:39.462797 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Oct 2 19:14:39.489111 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:14:39.489790 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Oct 2 19:14:39.489889 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:14:39.492355 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:14:39.494017 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:14:39.494299 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:14:39.496794 systemd[1]: Starting disk-uuid.service... Oct 2 19:14:39.511769 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (471) Oct 2 19:14:39.517460 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:14:39.518767 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 2 19:14:40.517137 disk-uuid[538]: The operation has completed successfully. Oct 2 19:14:40.517780 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:14:40.560148 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:14:40.560420 systemd[1]: Finished disk-uuid.service. Oct 2 19:14:40.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.561152 systemd[1]: Starting verity-setup.service... Oct 2 19:14:40.570794 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:14:40.613799 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:14:40.614631 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:14:40.615889 systemd[1]: Finished verity-setup.service. Oct 2 19:14:40.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.670794 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:14:40.670431 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:14:40.671184 systemd[1]: Starting afterburn-network-kargs.service... Oct 2 19:14:40.671800 systemd[1]: Starting ignition-setup.service... Oct 2 19:14:40.684774 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:14:40.684802 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:14:40.686079 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:14:40.689766 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:14:40.694697 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:14:40.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.700315 systemd[1]: Finished ignition-setup.service. Oct 2 19:14:40.700898 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:14:40.759721 systemd[1]: Finished afterburn-network-kargs.service. Oct 2 19:14:40.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.760377 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:14:40.811715 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:14:40.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.810000 audit: BPF prog-id=9 op=LOAD Oct 2 19:14:40.812574 systemd[1]: Starting systemd-networkd.service... Oct 2 19:14:40.833017 systemd-networkd[723]: lo: Link UP Oct 2 19:14:40.833024 systemd-networkd[723]: lo: Gained carrier Oct 2 19:14:40.833847 systemd-networkd[723]: Enumeration completed Oct 2 19:14:40.837968 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 2 19:14:40.838105 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 2 19:14:40.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.834003 systemd[1]: Started systemd-networkd.service. Oct 2 19:14:40.834142 systemd[1]: Reached target network.target. Oct 2 19:14:40.834153 systemd-networkd[723]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Oct 2 19:14:40.834708 systemd[1]: Starting iscsiuio.service... Oct 2 19:14:40.838714 systemd-networkd[723]: ens192: Link UP Oct 2 19:14:40.838719 systemd-networkd[723]: ens192: Gained carrier Oct 2 19:14:40.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.840349 systemd[1]: Started iscsiuio.service. Oct 2 19:14:40.840917 systemd[1]: Starting iscsid.service... Oct 2 19:14:40.843332 iscsid[728]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:14:40.843332 iscsid[728]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:14:40.843332 iscsid[728]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:14:40.843332 iscsid[728]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:14:40.843332 iscsid[728]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:14:40.843332 iscsid[728]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:14:40.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.844477 systemd[1]: Started iscsid.service. Oct 2 19:14:40.844983 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:14:40.851401 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:14:40.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.851559 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:14:40.851669 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:14:40.851912 systemd[1]: Reached target remote-fs.target. Oct 2 19:14:40.852460 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:14:40.857769 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:14:40.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.862693 ignition[595]: Ignition 2.14.0 Oct 2 19:14:40.862700 ignition[595]: Stage: fetch-offline Oct 2 19:14:40.862729 ignition[595]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:14:40.862742 ignition[595]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:14:40.865751 ignition[595]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:14:40.865830 ignition[595]: parsed url from cmdline: "" Oct 2 19:14:40.865832 ignition[595]: no config URL provided Oct 2 19:14:40.865835 ignition[595]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:14:40.865839 ignition[595]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:14:40.866216 ignition[595]: config successfully fetched Oct 2 19:14:40.866235 ignition[595]: parsing config with SHA512: 5ab0d809675e5eb6c9e116aae4fab5b259a1df60bb9516ed1067854fa3a80541591bc7b73b3adf906d6d2d6348102a73c3b2237965fc682160d551a8b842d832 Oct 2 19:14:40.887201 unknown[595]: fetched base config from "system" Oct 2 19:14:40.887207 unknown[595]: fetched user config from "vmware" Oct 2 19:14:40.887498 ignition[595]: fetch-offline: fetch-offline passed Oct 2 19:14:40.887529 ignition[595]: Ignition finished successfully Oct 2 19:14:40.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.888396 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:14:40.888542 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 19:14:40.888995 systemd[1]: Starting ignition-kargs.service... Oct 2 19:14:40.893960 ignition[743]: Ignition 2.14.0 Oct 2 19:14:40.893966 ignition[743]: Stage: kargs Oct 2 19:14:40.894024 ignition[743]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:14:40.894033 ignition[743]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:14:40.895350 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:14:40.896937 ignition[743]: kargs: kargs passed Oct 2 19:14:40.896963 ignition[743]: Ignition finished successfully Oct 2 19:14:40.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.897974 systemd[1]: Finished ignition-kargs.service. Oct 2 19:14:40.898564 systemd[1]: Starting ignition-disks.service... Oct 2 19:14:40.903513 ignition[750]: Ignition 2.14.0 Oct 2 19:14:40.903520 ignition[750]: Stage: disks Oct 2 19:14:40.903583 ignition[750]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:14:40.903593 ignition[750]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:14:40.904869 ignition[750]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:14:40.906402 ignition[750]: disks: disks passed Oct 2 19:14:40.906427 ignition[750]: Ignition finished successfully Oct 2 19:14:40.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.907060 systemd[1]: Finished ignition-disks.service. Oct 2 19:14:40.907217 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:14:40.907310 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:14:40.907395 systemd[1]: Reached target local-fs.target. Oct 2 19:14:40.907474 systemd[1]: Reached target sysinit.target. Oct 2 19:14:40.907552 systemd[1]: Reached target basic.target. Oct 2 19:14:40.908158 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:14:40.918859 systemd-fsck[758]: ROOT: clean, 603/1628000 files, 124049/1617920 blocks Oct 2 19:14:40.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.920418 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:14:40.921124 systemd[1]: Mounting sysroot.mount... Oct 2 19:14:40.928450 systemd[1]: Mounted sysroot.mount. Oct 2 19:14:40.928842 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:14:40.928564 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:14:40.929517 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:14:40.929879 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:14:40.929901 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:14:40.929914 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:14:40.931179 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:14:40.931738 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:14:40.934406 initrd-setup-root[768]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:14:40.937836 initrd-setup-root[776]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:14:40.939974 initrd-setup-root[784]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:14:40.942095 initrd-setup-root[792]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:14:40.970369 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:14:40.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.970956 systemd[1]: Starting ignition-mount.service... Oct 2 19:14:40.971404 systemd[1]: Starting sysroot-boot.service... Oct 2 19:14:40.974877 bash[809]: umount: /sysroot/usr/share/oem: not mounted. Oct 2 19:14:40.979720 ignition[810]: INFO : Ignition 2.14.0 Oct 2 19:14:40.979720 ignition[810]: INFO : Stage: mount Oct 2 19:14:40.980076 ignition[810]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:14:40.980076 ignition[810]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:14:40.981092 ignition[810]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:14:40.982524 ignition[810]: INFO : mount: mount passed Oct 2 19:14:40.982640 ignition[810]: INFO : Ignition finished successfully Oct 2 19:14:40.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:40.983141 systemd[1]: Finished ignition-mount.service. Oct 2 19:14:40.991406 systemd[1]: Finished sysroot-boot.service. Oct 2 19:14:40.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:41.629560 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:14:41.637777 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (818) Oct 2 19:14:41.640518 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:14:41.640539 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:14:41.640550 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:14:41.644772 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:14:41.646584 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:14:41.647452 systemd[1]: Starting ignition-files.service... Oct 2 19:14:41.658723 ignition[838]: INFO : Ignition 2.14.0 Oct 2 19:14:41.658723 ignition[838]: INFO : Stage: files Oct 2 19:14:41.659030 ignition[838]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:14:41.659030 ignition[838]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:14:41.660041 ignition[838]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:14:41.662034 ignition[838]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:14:41.662388 ignition[838]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:14:41.662388 ignition[838]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:14:41.665182 ignition[838]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:14:41.665382 ignition[838]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:14:41.666107 unknown[838]: wrote ssh authorized keys file for user: core Oct 2 19:14:41.666536 ignition[838]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:14:41.667061 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:14:41.667061 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:14:41.984550 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:14:42.018077 systemd-networkd[723]: ens192: Gained IPv6LL Oct 2 19:14:42.090268 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:14:42.090566 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:14:42.090566 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:14:42.090566 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:14:42.326575 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:14:42.379918 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:14:42.380280 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:14:42.380280 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:14:42.380280 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:14:42.462873 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:14:43.042332 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:14:43.042763 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:14:43.042763 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:14:43.042763 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:14:43.109373 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:14:44.715393 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:14:44.715899 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:14:44.716099 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:14:44.716304 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:14:44.776434 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:14:45.334017 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Oct 2 19:14:45.334326 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:14:45.334326 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:14:45.334326 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:14:45.334326 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:14:45.334326 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:14:45.334326 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:14:45.334326 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:14:45.335574 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 2 19:14:45.335574 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:14:45.338493 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065044800" Oct 2 19:14:45.338708 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065044800": device or resource busy Oct 2 19:14:45.338921 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3065044800", trying btrfs: device or resource busy Oct 2 19:14:45.339133 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065044800" Oct 2 19:14:45.340604 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065044800" Oct 2 19:14:45.340789 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (844) Oct 2 19:14:45.341205 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem3065044800" Oct 2 19:14:45.341407 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem3065044800" Oct 2 19:14:45.341599 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 2 19:14:45.342845 systemd[1]: mnt-oem3065044800.mount: Deactivated successfully. Oct 2 19:14:45.344320 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 2 19:14:45.344569 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 2 19:14:45.344774 ignition[838]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Oct 2 19:14:45.344914 ignition[838]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Oct 2 19:14:45.345054 ignition[838]: INFO : files: op(11): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:14:45.345217 ignition[838]: INFO : files: op(11): op(12): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:14:45.345454 ignition[838]: INFO : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:14:45.345647 ignition[838]: INFO : files: op(11): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:14:45.345808 ignition[838]: INFO : files: op(13): [started] processing unit "prepare-critools.service" Oct 2 19:14:45.345991 ignition[838]: INFO : files: op(13): op(14): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:14:45.346309 ignition[838]: INFO : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:14:45.346499 ignition[838]: INFO : files: op(13): [finished] processing unit "prepare-critools.service" Oct 2 19:14:45.346643 ignition[838]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Oct 2 19:14:45.346812 ignition[838]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:14:45.347042 ignition[838]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:14:45.347237 ignition[838]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Oct 2 19:14:45.347384 ignition[838]: INFO : files: op(17): [started] setting preset to enabled for "vmtoolsd.service" Oct 2 19:14:45.347591 ignition[838]: INFO : files: op(17): [finished] setting preset to enabled for "vmtoolsd.service" Oct 2 19:14:45.347741 ignition[838]: INFO : files: op(18): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:14:45.347918 ignition[838]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:14:45.348083 ignition[838]: INFO : files: op(19): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:14:45.348249 ignition[838]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:14:45.348401 ignition[838]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Oct 2 19:14:45.348557 ignition[838]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:14:45.434805 ignition[838]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:14:45.435029 ignition[838]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Oct 2 19:14:45.435029 ignition[838]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:14:45.435029 ignition[838]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:14:45.435029 ignition[838]: INFO : files: files passed Oct 2 19:14:45.435029 ignition[838]: INFO : Ignition finished successfully Oct 2 19:14:45.436521 systemd[1]: Finished ignition-files.service. Oct 2 19:14:45.440316 kernel: kauditd_printk_skb: 24 callbacks suppressed Oct 2 19:14:45.440337 kernel: audit: type=1130 audit(1696274085.435:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.437555 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:14:45.440469 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:14:45.441273 systemd[1]: Starting ignition-quench.service... Oct 2 19:14:45.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.443200 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:14:45.448094 kernel: audit: type=1130 audit(1696274085.441:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.448108 kernel: audit: type=1131 audit(1696274085.443:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.443244 systemd[1]: Finished ignition-quench.service. Oct 2 19:14:45.448240 initrd-setup-root-after-ignition[865]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:14:45.448597 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:14:45.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.448894 systemd[1]: Reached target ignition-complete.target. Oct 2 19:14:45.451497 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:14:45.451775 kernel: audit: type=1130 audit(1696274085.447:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.459337 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:14:45.459383 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:14:45.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.459799 systemd[1]: Reached target initrd-fs.target. Oct 2 19:14:45.464896 kernel: audit: type=1130 audit(1696274085.457:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.464909 kernel: audit: type=1131 audit(1696274085.457:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.464434 systemd[1]: Reached target initrd.target. Oct 2 19:14:45.464537 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:14:45.465373 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:14:45.471886 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:14:45.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.474878 kernel: audit: type=1130 audit(1696274085.470:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.472517 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:14:45.478087 systemd[1]: Stopped target network.target. Oct 2 19:14:45.478351 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:14:45.478604 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:14:45.478882 systemd[1]: Stopped target timers.target. Oct 2 19:14:45.479127 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:14:45.479320 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:14:45.479622 systemd[1]: Stopped target initrd.target. Oct 2 19:14:45.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.482129 kernel: audit: type=1131 audit(1696274085.477:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.482391 systemd[1]: Stopped target basic.target. Oct 2 19:14:45.482645 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:14:45.482909 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:14:45.483163 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:14:45.483421 systemd[1]: Stopped target remote-fs.target. Oct 2 19:14:45.483667 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:14:45.483929 systemd[1]: Stopped target sysinit.target. Oct 2 19:14:45.484178 systemd[1]: Stopped target local-fs.target. Oct 2 19:14:45.484423 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:14:45.484670 systemd[1]: Stopped target swap.target. Oct 2 19:14:45.484898 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:14:45.485091 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:14:45.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.485419 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:14:45.487777 kernel: audit: type=1131 audit(1696274085.483:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.487979 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:14:45.488106 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:14:45.488409 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:14:45.490867 kernel: audit: type=1131 audit(1696274085.486:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.488491 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:14:45.491040 systemd[1]: Stopped target paths.target. Oct 2 19:14:45.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.491179 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:14:45.492779 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:14:45.492965 systemd[1]: Stopped target slices.target. Oct 2 19:14:45.493127 systemd[1]: Stopped target sockets.target. Oct 2 19:14:45.493279 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:14:45.493337 systemd[1]: Closed iscsid.socket. Oct 2 19:14:45.493559 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:14:45.493618 systemd[1]: Closed iscsiuio.socket. Oct 2 19:14:45.493851 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:14:45.493930 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:14:45.494160 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:14:45.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.494230 systemd[1]: Stopped ignition-files.service. Oct 2 19:14:45.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.494968 systemd[1]: Stopping ignition-mount.service... Oct 2 19:14:45.501201 ignition[878]: INFO : Ignition 2.14.0 Oct 2 19:14:45.501201 ignition[878]: INFO : Stage: umount Oct 2 19:14:45.501201 ignition[878]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:14:45.501201 ignition[878]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:14:45.501201 ignition[878]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:14:45.495488 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:14:45.495745 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:14:45.495974 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:14:45.496063 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:14:45.496142 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:14:45.496325 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:14:45.496400 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:14:45.498279 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:14:45.498326 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:14:45.503527 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:14:45.503581 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:14:45.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.506175 ignition[878]: INFO : umount: umount passed Oct 2 19:14:45.506175 ignition[878]: INFO : Ignition finished successfully Oct 2 19:14:45.506584 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:14:45.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.505000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:14:45.506635 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:14:45.508012 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:14:45.508060 systemd[1]: Stopped ignition-mount.service. Oct 2 19:14:45.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.507000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:14:45.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.509246 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:14:45.509451 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:14:45.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.509467 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:14:45.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.509562 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:14:45.509582 systemd[1]: Stopped ignition-disks.service. Oct 2 19:14:45.509788 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:14:45.509807 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:14:45.509965 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:14:45.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.509984 systemd[1]: Stopped ignition-setup.service. Oct 2 19:14:45.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.510494 systemd[1]: Stopping network-cleanup.service... Oct 2 19:14:45.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.510636 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:14:45.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.510661 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:14:45.510909 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Oct 2 19:14:45.510931 systemd[1]: Stopped afterburn-network-kargs.service. Oct 2 19:14:45.511064 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:14:45.511086 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:14:45.511260 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:14:45.511278 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:14:45.513600 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:14:45.514427 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:14:45.514706 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:14:45.514749 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:14:45.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.514979 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:14:45.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.515001 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:14:45.516736 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:14:45.516904 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:14:45.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.517481 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:14:45.517510 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:14:45.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.517619 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:14:45.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.517636 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:14:45.517729 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:14:45.517749 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:14:45.517873 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:14:45.517892 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:14:45.518002 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:14:45.518021 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:14:45.518474 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:14:45.518573 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:14:45.518600 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:14:45.518840 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:14:45.518860 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:14:45.519051 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:14:45.519070 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:14:45.519877 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 19:14:45.520109 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:14:45.520152 systemd[1]: Stopped network-cleanup.service. Oct 2 19:14:45.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.523151 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:14:45.523192 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:14:45.523328 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:14:45.523741 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:14:45.529930 systemd[1]: Switching root. Oct 2 19:14:45.549387 iscsid[728]: iscsid shutting down. Oct 2 19:14:45.549543 systemd-journald[216]: Journal stopped Oct 2 19:14:47.474871 systemd-journald[216]: Received SIGTERM from PID 1 (n/a). Oct 2 19:14:47.474891 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:14:47.474900 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:14:47.474907 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:14:47.474912 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:14:47.474919 kernel: SELinux: policy capability open_perms=1 Oct 2 19:14:47.474926 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:14:47.474932 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:14:47.474937 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:14:47.474943 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:14:47.474948 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:14:47.474954 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:14:47.474961 systemd[1]: Successfully loaded SELinux policy in 38.939ms. Oct 2 19:14:47.474969 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.667ms. Oct 2 19:14:47.474977 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:14:47.474983 systemd[1]: Detected virtualization vmware. Oct 2 19:14:47.474991 systemd[1]: Detected architecture x86-64. Oct 2 19:14:47.474997 systemd[1]: Detected first boot. Oct 2 19:14:47.475004 systemd[1]: Initializing machine ID from random generator. Oct 2 19:14:47.475010 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:14:47.475017 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:14:47.475025 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:14:47.475032 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:14:47.475040 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:14:47.475047 systemd[1]: Stopped iscsiuio.service. Oct 2 19:14:47.475053 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:14:47.475060 systemd[1]: Stopped iscsid.service. Oct 2 19:14:47.475066 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:14:47.475072 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:14:47.475079 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:14:47.475086 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:14:47.475093 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:14:47.475100 systemd[1]: Created slice system-getty.slice. Oct 2 19:14:47.475106 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:14:47.475113 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:14:47.475119 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:14:47.475126 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:14:47.475132 systemd[1]: Created slice user.slice. Oct 2 19:14:47.475139 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:14:47.475145 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:14:47.475153 systemd[1]: Set up automount boot.automount. Oct 2 19:14:47.475161 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:14:47.475168 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:14:47.475175 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:14:47.475181 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:14:47.475188 systemd[1]: Reached target integritysetup.target. Oct 2 19:14:47.475195 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:14:47.475201 systemd[1]: Reached target remote-fs.target. Oct 2 19:14:47.475209 systemd[1]: Reached target slices.target. Oct 2 19:14:47.475216 systemd[1]: Reached target swap.target. Oct 2 19:14:47.475223 systemd[1]: Reached target torcx.target. Oct 2 19:14:47.475230 systemd[1]: Reached target veritysetup.target. Oct 2 19:14:47.475237 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:14:47.475245 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:14:47.475252 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:14:47.475259 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:14:47.475265 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:14:47.475272 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:14:47.475279 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:14:47.475286 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:14:47.476450 systemd[1]: Mounting media.mount... Oct 2 19:14:47.476468 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:14:47.476477 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:14:47.476484 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:14:47.476491 systemd[1]: Mounting tmp.mount... Oct 2 19:14:47.476498 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:14:47.476504 systemd[1]: Starting ignition-delete-config.service... Oct 2 19:14:47.476511 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:14:47.476518 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:14:47.476525 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:14:47.476533 systemd[1]: Starting modprobe@drm.service... Oct 2 19:14:47.476541 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:14:47.476547 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:14:47.476554 systemd[1]: Starting modprobe@loop.service... Oct 2 19:14:47.476561 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:14:47.476568 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:14:47.476575 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:14:47.476582 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:14:47.476590 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:14:47.476602 systemd[1]: Stopped systemd-journald.service. Oct 2 19:14:47.476614 systemd[1]: Starting systemd-journald.service... Oct 2 19:14:47.476622 kernel: fuse: init (API version 7.34) Oct 2 19:14:47.476629 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:14:47.476636 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:14:47.476642 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:14:47.476649 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:14:47.476656 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:14:47.476663 systemd[1]: Stopped verity-setup.service. Oct 2 19:14:47.476671 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:14:47.476678 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:14:47.476685 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:14:47.476692 systemd[1]: Mounted media.mount. Oct 2 19:14:47.476699 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:14:47.476706 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:14:47.476713 systemd[1]: Mounted tmp.mount. Oct 2 19:14:47.476722 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:14:47.476733 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:14:47.476746 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:14:47.476798 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:14:47.476810 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:14:47.476829 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:14:47.476841 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:14:47.476851 systemd[1]: Finished modprobe@drm.service. Oct 2 19:14:47.476864 systemd-journald[999]: Journal started Oct 2 19:14:47.476907 systemd-journald[999]: Runtime Journal (/run/log/journal/07ee520089bb41c88dd15e3edced5e23) is 4.8M, max 38.8M, 34.0M free. Oct 2 19:14:45.624000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:14:45.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:14:45.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:14:45.666000 audit: BPF prog-id=10 op=LOAD Oct 2 19:14:45.666000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:14:45.666000 audit: BPF prog-id=11 op=LOAD Oct 2 19:14:45.666000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:14:47.360000 audit: BPF prog-id=12 op=LOAD Oct 2 19:14:47.360000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:14:47.361000 audit: BPF prog-id=13 op=LOAD Oct 2 19:14:47.361000 audit: BPF prog-id=14 op=LOAD Oct 2 19:14:47.361000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:14:47.361000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:14:47.362000 audit: BPF prog-id=15 op=LOAD Oct 2 19:14:47.362000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:14:47.362000 audit: BPF prog-id=16 op=LOAD Oct 2 19:14:47.362000 audit: BPF prog-id=17 op=LOAD Oct 2 19:14:47.362000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:14:47.362000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:14:47.363000 audit: BPF prog-id=18 op=LOAD Oct 2 19:14:47.363000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:14:47.363000 audit: BPF prog-id=19 op=LOAD Oct 2 19:14:47.363000 audit: BPF prog-id=20 op=LOAD Oct 2 19:14:47.363000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:14:47.363000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:14:47.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.369000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:14:47.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.432000 audit: BPF prog-id=21 op=LOAD Oct 2 19:14:47.432000 audit: BPF prog-id=22 op=LOAD Oct 2 19:14:47.432000 audit: BPF prog-id=23 op=LOAD Oct 2 19:14:47.432000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:14:47.432000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:14:47.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.468000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:14:47.468000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff9f31c8c0 a2=4000 a3=7fff9f31c95c items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.468000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:14:47.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:45.749052 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:14:47.361606 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:14:45.749485 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:14:47.365538 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:14:45.749496 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:14:45.749514 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:14:45.749520 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:14:45.749537 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:14:45.749544 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:14:45.749678 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:14:45.749714 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:14:47.478462 jq[978]: true Oct 2 19:14:45.749723 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:14:45.750254 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:14:45.750273 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:14:45.750283 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:14:45.750291 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:14:45.750300 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:14:45.750307 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:14:47.172163 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:47Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:14:47.172326 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:47Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:14:47.172400 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:47Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:14:47.172499 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:47Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:14:47.172532 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:47Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:14:47.479122 jq[1024]: true Oct 2 19:14:47.172573 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2023-10-02T19:14:47Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:14:47.481769 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:14:47.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.483340 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:14:47.483355 systemd[1]: Started systemd-journald.service. Oct 2 19:14:47.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.484050 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:14:47.484119 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:14:47.484362 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:14:47.484562 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:14:47.484768 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:14:47.485549 systemd[1]: Reached target network-pre.target. Oct 2 19:14:47.486414 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:14:47.487202 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:14:47.490855 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:14:47.493167 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:14:47.493914 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:14:47.494033 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:14:47.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.518822 kernel: loop: module loaded Oct 2 19:14:47.518865 systemd-journald[999]: Time spent on flushing to /var/log/journal/07ee520089bb41c88dd15e3edced5e23 is 56.557ms for 2014 entries. Oct 2 19:14:47.518865 systemd-journald[999]: System Journal (/var/log/journal/07ee520089bb41c88dd15e3edced5e23) is 8.0M, max 584.8M, 576.8M free. Oct 2 19:14:47.586083 systemd-journald[999]: Received client request to flush runtime journal. Oct 2 19:14:47.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.494643 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:14:47.495342 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:14:47.496304 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:14:47.497143 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:14:47.497279 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:14:47.508233 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:14:47.508390 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:14:47.517625 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:14:47.517911 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:14:47.517989 systemd[1]: Finished modprobe@loop.service. Oct 2 19:14:47.518164 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:14:47.541770 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:14:47.542675 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:14:47.586579 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:14:47.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.594190 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:14:47.596606 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:14:47.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.597488 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:14:47.602795 udevadm[1043]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:14:47.617477 ignition[1025]: Ignition 2.14.0 Oct 2 19:14:47.617726 ignition[1025]: deleting config from guestinfo properties Oct 2 19:14:47.621749 ignition[1025]: Successfully deleted config Oct 2 19:14:47.622258 systemd[1]: Finished ignition-delete-config.service. Oct 2 19:14:47.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.933643 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:14:47.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.932000 audit: BPF prog-id=24 op=LOAD Oct 2 19:14:47.932000 audit: BPF prog-id=25 op=LOAD Oct 2 19:14:47.932000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:14:47.932000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:14:47.934944 systemd[1]: Starting systemd-udevd.service... Oct 2 19:14:47.948063 systemd-udevd[1044]: Using default interface naming scheme 'v252'. Oct 2 19:14:47.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:47.968000 audit: BPF prog-id=26 op=LOAD Oct 2 19:14:47.969068 systemd[1]: Started systemd-udevd.service. Oct 2 19:14:47.970308 systemd[1]: Starting systemd-networkd.service... Oct 2 19:14:47.978000 audit: BPF prog-id=27 op=LOAD Oct 2 19:14:47.978000 audit: BPF prog-id=28 op=LOAD Oct 2 19:14:47.978000 audit: BPF prog-id=29 op=LOAD Oct 2 19:14:47.981099 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:14:47.999065 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:14:47.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.000500 systemd[1]: Started systemd-userdbd.service. Oct 2 19:14:48.039774 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:14:48.047786 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:14:48.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.054795 systemd-networkd[1052]: lo: Link UP Oct 2 19:14:48.054799 systemd-networkd[1052]: lo: Gained carrier Oct 2 19:14:48.055090 systemd-networkd[1052]: Enumeration completed Oct 2 19:14:48.055145 systemd[1]: Started systemd-networkd.service. Oct 2 19:14:48.055816 systemd-networkd[1052]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Oct 2 19:14:48.059236 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 2 19:14:48.059361 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 2 19:14:48.061209 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Oct 2 19:14:48.061836 systemd-networkd[1052]: ens192: Link UP Oct 2 19:14:48.061966 systemd-networkd[1052]: ens192: Gained carrier Oct 2 19:14:48.074773 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1060) Oct 2 19:14:48.094568 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:14:48.112000 audit[1056]: AVC avc: denied { confidentiality } for pid=1056 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:14:48.112000 audit[1056]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5578f4b16240 a1=32194 a2=7ff2f1705bc5 a3=5 items=106 ppid=1044 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.112000 audit: CWD cwd="/" Oct 2 19:14:48.112000 audit: PATH item=0 name=(null) inode=17896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=1 name=(null) inode=17897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=2 name=(null) inode=17896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=3 name=(null) inode=17898 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=4 name=(null) inode=17896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=5 name=(null) inode=17899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=6 name=(null) inode=17899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=7 name=(null) inode=17900 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=8 name=(null) inode=17899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=9 name=(null) inode=17901 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=10 name=(null) inode=17899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=11 name=(null) inode=17902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=12 name=(null) inode=17899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=13 name=(null) inode=17903 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=14 name=(null) inode=17899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=15 name=(null) inode=17904 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=16 name=(null) inode=17896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=17 name=(null) inode=17905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=18 name=(null) inode=17905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=19 name=(null) inode=17906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=20 name=(null) inode=17905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=21 name=(null) inode=17907 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=22 name=(null) inode=17905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=23 name=(null) inode=17908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=24 name=(null) inode=17905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=25 name=(null) inode=17909 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=26 name=(null) inode=17905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=27 name=(null) inode=17910 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=28 name=(null) inode=17896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=29 name=(null) inode=17911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=30 name=(null) inode=17911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=31 name=(null) inode=17912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=32 name=(null) inode=17911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=33 name=(null) inode=17913 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=34 name=(null) inode=17911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=35 name=(null) inode=17914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=36 name=(null) inode=17911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=37 name=(null) inode=17915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=38 name=(null) inode=17911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=39 name=(null) inode=17916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=40 name=(null) inode=17896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=41 name=(null) inode=17917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=42 name=(null) inode=17917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=43 name=(null) inode=17918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=44 name=(null) inode=17917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=45 name=(null) inode=17919 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=46 name=(null) inode=17917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=47 name=(null) inode=17920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=48 name=(null) inode=17917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=49 name=(null) inode=17921 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=50 name=(null) inode=17917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=51 name=(null) inode=17922 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=52 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=53 name=(null) inode=17923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=54 name=(null) inode=17923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=55 name=(null) inode=17924 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=56 name=(null) inode=17923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=57 name=(null) inode=17925 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=58 name=(null) inode=17923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=59 name=(null) inode=17926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=60 name=(null) inode=17926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=61 name=(null) inode=17927 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=62 name=(null) inode=17926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=63 name=(null) inode=17928 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=64 name=(null) inode=17926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=65 name=(null) inode=17929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=66 name=(null) inode=17926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=67 name=(null) inode=17930 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=68 name=(null) inode=17926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=69 name=(null) inode=17931 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=70 name=(null) inode=17923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=71 name=(null) inode=17932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=72 name=(null) inode=17932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=73 name=(null) inode=17933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=74 name=(null) inode=17932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=75 name=(null) inode=17934 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=76 name=(null) inode=17932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=77 name=(null) inode=17935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=78 name=(null) inode=17932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=79 name=(null) inode=17936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=80 name=(null) inode=17932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=81 name=(null) inode=17937 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=82 name=(null) inode=17923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=83 name=(null) inode=17938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=84 name=(null) inode=17938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=85 name=(null) inode=17939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=86 name=(null) inode=17938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=87 name=(null) inode=17940 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=88 name=(null) inode=17938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=89 name=(null) inode=17941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=90 name=(null) inode=17938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=91 name=(null) inode=17942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=92 name=(null) inode=17938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=93 name=(null) inode=17943 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=94 name=(null) inode=17923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=95 name=(null) inode=17944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=96 name=(null) inode=17944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=97 name=(null) inode=17945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=98 name=(null) inode=17944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=99 name=(null) inode=17946 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=100 name=(null) inode=17944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=101 name=(null) inode=17947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=102 name=(null) inode=17944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=103 name=(null) inode=17948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=104 name=(null) inode=17944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PATH item=105 name=(null) inode=17949 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:48.112000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:14:48.124516 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Oct 2 19:14:48.124629 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Oct 2 19:14:48.124701 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Oct 2 19:14:48.124777 kernel: Guest personality initialized and is active Oct 2 19:14:48.139770 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Oct 2 19:14:48.143893 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Oct 2 19:14:48.143925 kernel: Initialized host personality Oct 2 19:14:48.157501 (udev-worker)[1053]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Oct 2 19:14:48.161768 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:14:48.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.176016 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:14:48.176915 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:14:48.194886 lvm[1077]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:14:48.218344 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:14:48.218522 systemd[1]: Reached target cryptsetup.target. Oct 2 19:14:48.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.219590 systemd[1]: Starting lvm2-activation.service... Oct 2 19:14:48.222152 lvm[1078]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:14:48.253309 systemd[1]: Finished lvm2-activation.service. Oct 2 19:14:48.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.253483 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:14:48.253585 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:14:48.253601 systemd[1]: Reached target local-fs.target. Oct 2 19:14:48.253689 systemd[1]: Reached target machines.target. Oct 2 19:14:48.254587 systemd[1]: Starting ldconfig.service... Oct 2 19:14:48.255087 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:14:48.255118 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:14:48.255798 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:14:48.256469 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:14:48.257377 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:14:48.257526 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:14:48.257552 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:14:48.258283 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:14:48.267641 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1080 (bootctl) Oct 2 19:14:48.268371 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:14:48.274701 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:14:48.279813 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:14:48.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.283692 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:14:48.287147 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:14:48.546039 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:14:48.546483 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:14:48.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.583842 systemd-fsck[1088]: fsck.fat 4.2 (2021-01-31) Oct 2 19:14:48.583842 systemd-fsck[1088]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:14:48.586298 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:14:48.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.587383 systemd[1]: Mounting boot.mount... Oct 2 19:14:48.594608 systemd[1]: Mounted boot.mount. Oct 2 19:14:48.605206 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:14:48.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.652658 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:14:48.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.653764 systemd[1]: Starting audit-rules.service... Oct 2 19:14:48.654546 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:14:48.654000 audit: BPF prog-id=30 op=LOAD Oct 2 19:14:48.655300 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:14:48.656781 systemd[1]: Starting systemd-resolved.service... Oct 2 19:14:48.656000 audit: BPF prog-id=31 op=LOAD Oct 2 19:14:48.658406 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:14:48.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.661067 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:14:48.661432 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:14:48.661702 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:14:48.664000 audit[1096]: SYSTEM_BOOT pid=1096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.667781 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:14:48.688747 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:14:48.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.707167 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:14:48.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:48.707350 systemd[1]: Reached target time-set.target. Oct 2 19:14:48.709735 augenrules[1111]: No rules Oct 2 19:14:48.707000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:14:48.707000 audit[1111]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda9d7ab60 a2=420 a3=0 items=0 ppid=1091 pid=1111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.707000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:14:48.709974 systemd[1]: Finished audit-rules.service. Oct 2 19:14:48.726176 systemd-resolved[1094]: Positive Trust Anchors: Oct 2 19:14:48.726184 systemd-resolved[1094]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:14:48.726203 systemd-resolved[1094]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:14:48.790125 systemd-resolved[1094]: Defaulting to hostname 'linux'. Oct 2 19:14:48.791876 systemd[1]: Started systemd-resolved.service. Oct 2 19:14:48.792030 systemd[1]: Reached target network.target. Oct 2 19:14:48.792117 systemd[1]: Reached target nss-lookup.target. Oct 2 19:14:48.924316 ldconfig[1079]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:14:48.944090 systemd[1]: Finished ldconfig.service. Oct 2 19:14:48.945150 systemd[1]: Starting systemd-update-done.service... Oct 2 19:14:48.949406 systemd[1]: Finished systemd-update-done.service. Oct 2 19:14:48.949561 systemd[1]: Reached target sysinit.target. Oct 2 19:14:48.949700 systemd[1]: Started motdgen.path. Oct 2 19:14:48.949814 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:14:48.949995 systemd[1]: Started logrotate.timer. Oct 2 19:14:48.950141 systemd[1]: Started mdadm.timer. Oct 2 19:14:48.950226 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:14:48.950319 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:14:48.950337 systemd[1]: Reached target paths.target. Oct 2 19:14:48.950424 systemd[1]: Reached target timers.target. Oct 2 19:14:48.950651 systemd[1]: Listening on dbus.socket. Oct 2 19:14:48.951464 systemd[1]: Starting docker.socket... Oct 2 19:14:48.953391 systemd[1]: Listening on sshd.socket. Oct 2 19:14:48.953545 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:14:48.953802 systemd[1]: Listening on docker.socket. Oct 2 19:14:48.953934 systemd[1]: Reached target sockets.target. Oct 2 19:14:48.954031 systemd[1]: Reached target basic.target. Oct 2 19:14:48.954147 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:14:48.954166 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:14:48.954879 systemd[1]: Starting containerd.service... Oct 2 19:14:48.955681 systemd[1]: Starting dbus.service... Oct 2 19:14:48.956627 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:14:48.957583 systemd[1]: Starting extend-filesystems.service... Oct 2 19:14:48.958314 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:14:48.959078 jq[1122]: false Oct 2 19:14:48.961129 systemd[1]: Starting motdgen.service... Oct 2 19:14:48.961908 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:14:48.962666 systemd[1]: Starting prepare-critools.service... Oct 2 19:14:48.963462 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:14:48.964709 systemd[1]: Starting sshd-keygen.service... Oct 2 19:14:48.966519 systemd[1]: Starting systemd-logind.service... Oct 2 19:14:48.966629 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:14:48.966671 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:14:48.967047 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:14:48.967491 systemd[1]: Starting update-engine.service... Oct 2 19:14:48.970458 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:14:48.971304 systemd[1]: Starting vmtoolsd.service... Oct 2 19:15:23.114060 jq[1133]: true Oct 2 19:14:48.972200 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:14:48.972295 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:15:23.111522 systemd-timesyncd[1095]: Contacted time server 74.6.168.73:123 (0.flatcar.pool.ntp.org). Oct 2 19:15:23.111564 systemd-timesyncd[1095]: Initial clock synchronization to Mon 2023-10-02 19:15:23.111463 UTC. Oct 2 19:15:23.115051 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:15:23.115141 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:15:23.126572 jq[1137]: true Oct 2 19:15:23.127090 systemd[1]: Started vmtoolsd.service. Oct 2 19:15:23.136562 tar[1141]: ./ Oct 2 19:15:23.136562 tar[1141]: ./loopback Oct 2 19:15:23.138326 extend-filesystems[1123]: Found sda Oct 2 19:15:23.138326 extend-filesystems[1123]: Found sda1 Oct 2 19:15:23.138326 extend-filesystems[1123]: Found sda2 Oct 2 19:15:23.138326 extend-filesystems[1123]: Found sda3 Oct 2 19:15:23.138326 extend-filesystems[1123]: Found usr Oct 2 19:15:23.138326 extend-filesystems[1123]: Found sda4 Oct 2 19:15:23.138326 extend-filesystems[1123]: Found sda6 Oct 2 19:15:23.138326 extend-filesystems[1123]: Found sda7 Oct 2 19:15:23.138326 extend-filesystems[1123]: Found sda9 Oct 2 19:15:23.138326 extend-filesystems[1123]: Checking size of /dev/sda9 Oct 2 19:15:23.139740 tar[1136]: crictl Oct 2 19:15:23.145955 systemd-resolved[1094]: Clock change detected. Flushing caches. Oct 2 19:15:23.157948 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:15:23.158063 systemd[1]: Finished motdgen.service. Oct 2 19:15:23.162446 extend-filesystems[1123]: Old size kept for /dev/sda9 Oct 2 19:15:23.162446 extend-filesystems[1123]: Found sr0 Oct 2 19:15:23.162392 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:15:23.162653 systemd[1]: Finished extend-filesystems.service. Oct 2 19:15:23.172107 dbus-daemon[1121]: [system] SELinux support is enabled Oct 2 19:15:23.172193 systemd[1]: Started dbus.service. Oct 2 19:15:23.173628 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:15:23.173645 systemd[1]: Reached target system-config.target. Oct 2 19:15:23.173761 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:15:23.173771 systemd[1]: Reached target user-config.target. Oct 2 19:15:23.184417 bash[1177]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:15:23.184979 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:15:23.190008 env[1138]: time="2023-10-02T19:15:23.189985239Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:15:23.195557 kernel: NET: Registered PF_VSOCK protocol family Oct 2 19:15:23.206870 systemd-logind[1131]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:15:23.207467 systemd-logind[1131]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:15:23.207888 systemd-logind[1131]: New seat seat0. Oct 2 19:15:23.211496 systemd[1]: Started systemd-logind.service. Oct 2 19:15:23.211914 update_engine[1132]: I1002 19:15:23.210495 1132 main.cc:92] Flatcar Update Engine starting Oct 2 19:15:23.213456 systemd[1]: Started update-engine.service. Oct 2 19:15:23.214951 systemd[1]: Started locksmithd.service. Oct 2 19:15:23.215748 update_engine[1132]: I1002 19:15:23.215732 1132 update_check_scheduler.cc:74] Next update check in 9m15s Oct 2 19:15:23.225854 env[1138]: time="2023-10-02T19:15:23.225823588Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:15:23.226004 env[1138]: time="2023-10-02T19:15:23.225993620Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.226919592Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.226941696Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.227061593Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.227072190Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.227079387Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.227084842Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.227124882Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.227250449Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.227314282Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:15:23.227432 env[1138]: time="2023-10-02T19:15:23.227323376Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:15:23.227674 env[1138]: time="2023-10-02T19:15:23.227350384Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:15:23.227674 env[1138]: time="2023-10-02T19:15:23.227357196Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228754934Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228771697Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228782476Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228800602Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228809396Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228816997Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228823923Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228830942Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228837808Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228844595Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228851349Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228857640Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228906203Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:15:23.229574 env[1138]: time="2023-10-02T19:15:23.228949501Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229086086Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229105921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229114362Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229140172Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229147547Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229155510Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229161573Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229167816Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229174548Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229181025Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229188955Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229196405Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229259707Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229269180Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.229799 env[1138]: time="2023-10-02T19:15:23.229275664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.230022 env[1138]: time="2023-10-02T19:15:23.229281952Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:15:23.230022 env[1138]: time="2023-10-02T19:15:23.229289438Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:15:23.230022 env[1138]: time="2023-10-02T19:15:23.229295275Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:15:23.230022 env[1138]: time="2023-10-02T19:15:23.229308323Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:15:23.230022 env[1138]: time="2023-10-02T19:15:23.229329700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:15:23.230100 env[1138]: time="2023-10-02T19:15:23.229438427Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:15:23.230100 env[1138]: time="2023-10-02T19:15:23.229469419Z" level=info msg="Connect containerd service" Oct 2 19:15:23.230100 env[1138]: time="2023-10-02T19:15:23.229488494Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.230430265Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.230556019Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.230580207Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.230605248Z" level=info msg="containerd successfully booted in 0.042422s" Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.231612295Z" level=info msg="Start subscribing containerd event" Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.231640403Z" level=info msg="Start recovering state" Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.231670188Z" level=info msg="Start event monitor" Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.231680965Z" level=info msg="Start snapshots syncer" Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.231685885Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:15:23.234859 env[1138]: time="2023-10-02T19:15:23.231691360Z" level=info msg="Start streaming server" Oct 2 19:15:23.230651 systemd[1]: Started containerd.service. Oct 2 19:15:23.271347 tar[1141]: ./bandwidth Oct 2 19:15:23.326775 tar[1141]: ./ptp Oct 2 19:15:23.355829 tar[1141]: ./vlan Oct 2 19:15:23.398017 tar[1141]: ./host-device Oct 2 19:15:23.425063 tar[1141]: ./tuning Oct 2 19:15:23.449375 tar[1141]: ./vrf Oct 2 19:15:23.474190 tar[1141]: ./sbr Oct 2 19:15:23.498509 tar[1141]: ./tap Oct 2 19:15:23.516759 systemd-networkd[1052]: ens192: Gained IPv6LL Oct 2 19:15:23.528273 tar[1141]: ./dhcp Oct 2 19:15:23.597129 tar[1141]: ./static Oct 2 19:15:23.617815 tar[1141]: ./firewall Oct 2 19:15:23.647893 tar[1141]: ./macvlan Oct 2 19:15:23.675640 tar[1141]: ./dummy Oct 2 19:15:23.703737 tar[1141]: ./bridge Oct 2 19:15:23.734224 tar[1141]: ./ipvlan Oct 2 19:15:23.761713 tar[1141]: ./portmap Oct 2 19:15:23.788006 tar[1141]: ./host-local Oct 2 19:15:23.805939 systemd[1]: Finished prepare-critools.service. Oct 2 19:15:23.820455 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:15:23.844358 locksmithd[1184]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:15:23.856496 sshd_keygen[1157]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:15:23.868679 systemd[1]: Finished sshd-keygen.service. Oct 2 19:15:23.869833 systemd[1]: Starting issuegen.service... Oct 2 19:15:23.872797 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:15:23.872883 systemd[1]: Finished issuegen.service. Oct 2 19:15:23.873910 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:15:23.877666 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:15:23.878514 systemd[1]: Started getty@tty1.service. Oct 2 19:15:23.879267 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:15:23.879456 systemd[1]: Reached target getty.target. Oct 2 19:15:23.879609 systemd[1]: Reached target multi-user.target. Oct 2 19:15:23.880438 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:15:23.885982 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:15:23.886070 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:15:23.886382 systemd[1]: Startup finished in 877ms (kernel) + 7.031s (initrd) + 4.171s (userspace) = 12.080s. Oct 2 19:15:23.905276 login[1252]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 19:15:23.906864 login[1253]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:15:23.913981 systemd[1]: Created slice user-500.slice. Oct 2 19:15:23.914789 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:15:23.917693 systemd-logind[1131]: New session 1 of user core. Oct 2 19:15:23.920468 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:15:23.921371 systemd[1]: Starting user@500.service... Oct 2 19:15:23.923346 (systemd)[1256]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:23.966325 systemd[1256]: Queued start job for default target default.target. Oct 2 19:15:23.966844 systemd[1256]: Reached target paths.target. Oct 2 19:15:23.966916 systemd[1256]: Reached target sockets.target. Oct 2 19:15:23.966977 systemd[1256]: Reached target timers.target. Oct 2 19:15:23.967045 systemd[1256]: Reached target basic.target. Oct 2 19:15:23.967116 systemd[1256]: Reached target default.target. Oct 2 19:15:23.967154 systemd[1]: Started user@500.service. Oct 2 19:15:23.967214 systemd[1256]: Startup finished in 40ms. Oct 2 19:15:23.967938 systemd[1]: Started session-1.scope. Oct 2 19:15:24.905571 login[1252]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:15:24.909598 systemd-logind[1131]: New session 2 of user core. Oct 2 19:15:24.909623 systemd[1]: Started session-2.scope. Oct 2 19:16:03.266135 systemd[1]: Created slice system-sshd.slice. Oct 2 19:16:03.266987 systemd[1]: Started sshd@0-139.178.70.108:22-86.109.11.97:40274.service. Oct 2 19:16:03.318650 sshd[1280]: Accepted publickey for core from 86.109.11.97 port 40274 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:16:03.319538 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:03.323452 systemd[1]: Started session-3.scope. Oct 2 19:16:03.324320 systemd-logind[1131]: New session 3 of user core. Oct 2 19:16:03.374483 systemd[1]: Started sshd@1-139.178.70.108:22-86.109.11.97:40288.service. Oct 2 19:16:03.425252 sshd[1285]: Accepted publickey for core from 86.109.11.97 port 40288 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:16:03.426021 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:03.429142 systemd[1]: Started session-4.scope. Oct 2 19:16:03.429594 systemd-logind[1131]: New session 4 of user core. Oct 2 19:16:03.480099 sshd[1285]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:03.482550 systemd[1]: Started sshd@2-139.178.70.108:22-86.109.11.97:40298.service. Oct 2 19:16:03.483748 systemd[1]: sshd@1-139.178.70.108:22-86.109.11.97:40288.service: Deactivated successfully. Oct 2 19:16:03.484208 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:16:03.485119 systemd-logind[1131]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:16:03.485811 systemd-logind[1131]: Removed session 4. Oct 2 19:16:03.523490 sshd[1290]: Accepted publickey for core from 86.109.11.97 port 40298 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:16:03.524186 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:03.526918 systemd-logind[1131]: New session 5 of user core. Oct 2 19:16:03.527380 systemd[1]: Started session-5.scope. Oct 2 19:16:03.574477 sshd[1290]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:03.576587 systemd[1]: Started sshd@3-139.178.70.108:22-86.109.11.97:40306.service. Oct 2 19:16:03.576852 systemd[1]: sshd@2-139.178.70.108:22-86.109.11.97:40298.service: Deactivated successfully. Oct 2 19:16:03.577228 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:16:03.578684 systemd-logind[1131]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:16:03.579405 systemd-logind[1131]: Removed session 5. Oct 2 19:16:03.614392 sshd[1296]: Accepted publickey for core from 86.109.11.97 port 40306 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:16:03.615469 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:03.619043 systemd[1]: Started session-6.scope. Oct 2 19:16:03.620139 systemd-logind[1131]: New session 6 of user core. Oct 2 19:16:03.670952 sshd[1296]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:03.673765 systemd[1]: Started sshd@4-139.178.70.108:22-86.109.11.97:40316.service. Oct 2 19:16:03.674162 systemd[1]: sshd@3-139.178.70.108:22-86.109.11.97:40306.service: Deactivated successfully. Oct 2 19:16:03.674683 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:16:03.675320 systemd-logind[1131]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:16:03.676179 systemd-logind[1131]: Removed session 6. Oct 2 19:16:03.715059 sshd[1302]: Accepted publickey for core from 86.109.11.97 port 40316 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:16:03.716149 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:03.719230 systemd-logind[1131]: New session 7 of user core. Oct 2 19:16:03.719747 systemd[1]: Started session-7.scope. Oct 2 19:16:03.782386 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:16:03.783105 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:16:03.793620 dbus-daemon[1121]: Н\xba\xb0 V: received setenforce notice (enforcing=-375400464) Oct 2 19:16:03.793911 sudo[1306]: pam_unix(sudo:session): session closed for user root Oct 2 19:16:03.796523 sshd[1302]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:03.798489 systemd[1]: Started sshd@5-139.178.70.108:22-86.109.11.97:40330.service. Oct 2 19:16:03.798861 systemd[1]: sshd@4-139.178.70.108:22-86.109.11.97:40316.service: Deactivated successfully. Oct 2 19:16:03.800317 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:16:03.801229 systemd-logind[1131]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:16:03.802314 systemd-logind[1131]: Removed session 7. Oct 2 19:16:03.839354 sshd[1309]: Accepted publickey for core from 86.109.11.97 port 40330 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:16:03.840506 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:03.844087 systemd[1]: Started session-8.scope. Oct 2 19:16:03.845190 systemd-logind[1131]: New session 8 of user core. Oct 2 19:16:03.897280 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:16:03.897702 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:16:03.899879 sudo[1314]: pam_unix(sudo:session): session closed for user root Oct 2 19:16:03.903166 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:16:03.903311 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:16:03.910165 systemd[1]: Stopping audit-rules.service... Oct 2 19:16:03.909000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:16:03.912197 kernel: kauditd_printk_skb: 240 callbacks suppressed Oct 2 19:16:03.912239 kernel: audit: type=1305 audit(1696274163.909:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:16:03.909000 audit[1317]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb2653bd0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:03.918656 kernel: audit: type=1300 audit(1696274163.909:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb2653bd0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:03.918686 kernel: audit: type=1327 audit(1696274163.909:172): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:16:03.909000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:16:03.918727 auditctl[1317]: No rules Oct 2 19:16:03.919953 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:16:03.920064 systemd[1]: Stopped audit-rules.service. Oct 2 19:16:03.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.921218 systemd[1]: Starting audit-rules.service... Oct 2 19:16:03.924568 kernel: audit: type=1131 audit(1696274163.918:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.931754 augenrules[1334]: No rules Oct 2 19:16:03.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.932153 systemd[1]: Finished audit-rules.service. Oct 2 19:16:03.932590 sudo[1313]: pam_unix(sudo:session): session closed for user root Oct 2 19:16:03.931000 audit[1313]: USER_END pid=1313 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.938451 kernel: audit: type=1130 audit(1696274163.930:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.938482 kernel: audit: type=1106 audit(1696274163.931:175): pid=1313 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.939021 sshd[1309]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:03.931000 audit[1313]: CRED_DISP pid=1313 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.940871 systemd[1]: Started sshd@6-139.178.70.108:22-86.109.11.97:40334.service. Oct 2 19:16:03.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-86.109.11.97:40334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.942966 systemd[1]: sshd@5-139.178.70.108:22-86.109.11.97:40330.service: Deactivated successfully. Oct 2 19:16:03.943395 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:16:03.945163 kernel: audit: type=1104 audit(1696274163.931:176): pid=1313 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.945193 kernel: audit: type=1130 audit(1696274163.939:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-86.109.11.97:40334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.940000 audit[1309]: USER_END pid=1309 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:03.948806 kernel: audit: type=1106 audit(1696274163.940:178): pid=1309 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:03.948818 systemd-logind[1131]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:16:03.940000 audit[1309]: CRED_DISP pid=1309 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:03.951837 kernel: audit: type=1104 audit(1696274163.940:179): pid=1309 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:03.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.108:22-86.109.11.97:40330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:03.952082 systemd-logind[1131]: Removed session 8. Oct 2 19:16:03.983754 sshd[1339]: Accepted publickey for core from 86.109.11.97 port 40334 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:16:03.982000 audit[1339]: USER_ACCT pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:03.982000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:03.982000 audit[1339]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1b933a80 a2=3 a3=0 items=0 ppid=1 pid=1339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:03.982000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:03.984835 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:03.988415 systemd[1]: Started session-9.scope. Oct 2 19:16:03.988870 systemd-logind[1131]: New session 9 of user core. Oct 2 19:16:03.990000 audit[1339]: USER_START pid=1339 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:03.991000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:04.040210 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:16:04.040382 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:16:04.038000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.038000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.040000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.543810 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:16:04.547887 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:16:04.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.548099 systemd[1]: Reached target network-online.target. Oct 2 19:16:04.549040 systemd[1]: Starting docker.service... Oct 2 19:16:04.570461 env[1360]: time="2023-10-02T19:16:04.570434923Z" level=info msg="Starting up" Oct 2 19:16:04.571426 env[1360]: time="2023-10-02T19:16:04.571415251Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:16:04.571486 env[1360]: time="2023-10-02T19:16:04.571461650Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:16:04.571538 env[1360]: time="2023-10-02T19:16:04.571527932Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:16:04.571602 env[1360]: time="2023-10-02T19:16:04.571593321Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:16:04.572522 env[1360]: time="2023-10-02T19:16:04.572512621Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:16:04.572576 env[1360]: time="2023-10-02T19:16:04.572566613Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:16:04.572623 env[1360]: time="2023-10-02T19:16:04.572614006Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:16:04.572804 env[1360]: time="2023-10-02T19:16:04.572795189Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:16:04.586886 env[1360]: time="2023-10-02T19:16:04.586871988Z" level=info msg="Loading containers: start." Oct 2 19:16:04.616000 audit[1391]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.616000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff66501ec0 a2=0 a3=7fff66501eac items=0 ppid=1360 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.616000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:16:04.618000 audit[1393]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.618000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd5d8f0ef0 a2=0 a3=7ffd5d8f0edc items=0 ppid=1360 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.618000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:16:04.619000 audit[1395]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.619000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcb961d110 a2=0 a3=7ffcb961d0fc items=0 ppid=1360 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.619000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:16:04.620000 audit[1397]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.620000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd5fe5b940 a2=0 a3=7ffd5fe5b92c items=0 ppid=1360 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.620000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:16:04.621000 audit[1399]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.621000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9371bd20 a2=0 a3=7fff9371bd0c items=0 ppid=1360 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.621000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:16:04.633000 audit[1404]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.633000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd22b92770 a2=0 a3=7ffd22b9275c items=0 ppid=1360 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.633000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:16:04.635000 audit[1406]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.635000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd3997a010 a2=0 a3=7ffd39979ffc items=0 ppid=1360 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:16:04.637000 audit[1408]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.637000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc47bb21a0 a2=0 a3=7ffc47bb218c items=0 ppid=1360 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.637000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:16:04.638000 audit[1410]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.638000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe58c99810 a2=0 a3=7ffe58c997fc items=0 ppid=1360 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:04.641000 audit[1414]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.641000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff3df5f150 a2=0 a3=7fff3df5f13c items=0 ppid=1360 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:04.641000 audit[1415]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.641000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff09d94470 a2=0 a3=7fff09d9445c items=0 ppid=1360 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:04.648556 kernel: Initializing XFRM netlink socket Oct 2 19:16:04.671222 env[1360]: time="2023-10-02T19:16:04.671187621Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:16:04.684000 audit[1423]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.684000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd73f259e0 a2=0 a3=7ffd73f259cc items=0 ppid=1360 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.684000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:16:04.691000 audit[1426]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.691000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffff7f87a10 a2=0 a3=7ffff7f879fc items=0 ppid=1360 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:16:04.693000 audit[1429]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.693000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdfdf4afe0 a2=0 a3=7ffdfdf4afcc items=0 ppid=1360 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.693000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:16:04.694000 audit[1431]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.694000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd7cbc32c0 a2=0 a3=7ffd7cbc32ac items=0 ppid=1360 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.694000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:16:04.695000 audit[1433]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.695000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd9b3585e0 a2=0 a3=7ffd9b3585cc items=0 ppid=1360 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:16:04.696000 audit[1435]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.696000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffeae4a2910 a2=0 a3=7ffeae4a28fc items=0 ppid=1360 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.696000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:16:04.697000 audit[1437]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.697000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe67762640 a2=0 a3=7ffe6776262c items=0 ppid=1360 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.697000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:16:04.703000 audit[1440]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.703000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff32c09eb0 a2=0 a3=7fff32c09e9c items=0 ppid=1360 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.703000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:16:04.704000 audit[1442]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.704000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdf247f570 a2=0 a3=7ffdf247f55c items=0 ppid=1360 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.704000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:16:04.705000 audit[1444]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.705000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff3363ac40 a2=0 a3=7fff3363ac2c items=0 ppid=1360 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.705000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:16:04.706000 audit[1446]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.706000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb872ced0 a2=0 a3=7ffdb872cebc items=0 ppid=1360 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:16:04.708596 systemd-networkd[1052]: docker0: Link UP Oct 2 19:16:04.710000 audit[1450]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.710000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee24f8860 a2=0 a3=7ffee24f884c items=0 ppid=1360 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.710000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:04.710000 audit[1451]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:04.710000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd9d9dc720 a2=0 a3=7ffd9d9dc70c items=0 ppid=1360 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:04.710000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:04.712722 env[1360]: time="2023-10-02T19:16:04.712709611Z" level=info msg="Loading containers: done." Oct 2 19:16:04.718230 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1706163818-merged.mount: Deactivated successfully. Oct 2 19:16:04.722832 env[1360]: time="2023-10-02T19:16:04.722810769Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:16:04.722921 env[1360]: time="2023-10-02T19:16:04.722907589Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:16:04.722968 env[1360]: time="2023-10-02T19:16:04.722955981Z" level=info msg="Daemon has completed initialization" Oct 2 19:16:04.728216 systemd[1]: Started docker.service. Oct 2 19:16:04.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.730691 env[1360]: time="2023-10-02T19:16:04.730670429Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:16:04.744827 systemd[1]: Reloading. Oct 2 19:16:04.788880 /usr/lib/systemd/system-generators/torcx-generator[1497]: time="2023-10-02T19:16:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:16:04.789075 /usr/lib/systemd/system-generators/torcx-generator[1497]: time="2023-10-02T19:16:04Z" level=info msg="torcx already run" Oct 2 19:16:04.841310 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:16:04.841933 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:16:04.855653 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit: BPF prog-id=37 op=LOAD Oct 2 19:16:04.891000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit: BPF prog-id=38 op=LOAD Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit: BPF prog-id=39 op=LOAD Oct 2 19:16:04.891000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:16:04.891000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit: BPF prog-id=40 op=LOAD Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit: BPF prog-id=41 op=LOAD Oct 2 19:16:04.891000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:16:04.891000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit: BPF prog-id=42 op=LOAD Oct 2 19:16:04.892000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.892000 audit: BPF prog-id=43 op=LOAD Oct 2 19:16:04.892000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit: BPF prog-id=44 op=LOAD Oct 2 19:16:04.893000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit: BPF prog-id=45 op=LOAD Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit: BPF prog-id=46 op=LOAD Oct 2 19:16:04.893000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:16:04.893000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit: BPF prog-id=47 op=LOAD Oct 2 19:16:04.894000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit: BPF prog-id=48 op=LOAD Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.894000 audit: BPF prog-id=49 op=LOAD Oct 2 19:16:04.894000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:16:04.894000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.895000 audit: BPF prog-id=50 op=LOAD Oct 2 19:16:04.895000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:04.896000 audit: BPF prog-id=51 op=LOAD Oct 2 19:16:04.896000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:16:04.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.904694 systemd[1]: Started kubelet.service. Oct 2 19:16:04.946554 kubelet[1556]: E1002 19:16:04.946508 1556 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:16:04.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:16:04.947904 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:16:04.947974 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:16:05.226505 env[1138]: time="2023-10-02T19:16:05.226422997Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 19:16:05.790334 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2142685842.mount: Deactivated successfully. Oct 2 19:16:07.085966 env[1138]: time="2023-10-02T19:16:07.085913923Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:07.086586 env[1138]: time="2023-10-02T19:16:07.086571229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:07.087497 env[1138]: time="2023-10-02T19:16:07.087482783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:07.088478 env[1138]: time="2023-10-02T19:16:07.088464077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:07.088947 env[1138]: time="2023-10-02T19:16:07.088931086Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce\"" Oct 2 19:16:07.094930 env[1138]: time="2023-10-02T19:16:07.094866700Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 19:16:08.665522 env[1138]: time="2023-10-02T19:16:08.665486036Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:08.666139 env[1138]: time="2023-10-02T19:16:08.666123773Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:08.667144 env[1138]: time="2023-10-02T19:16:08.667129827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:08.668132 env[1138]: time="2023-10-02T19:16:08.668116185Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:08.668612 env[1138]: time="2023-10-02T19:16:08.668597163Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57\"" Oct 2 19:16:08.674747 env[1138]: time="2023-10-02T19:16:08.674725576Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 19:16:08.810453 update_engine[1132]: I1002 19:16:08.810196 1132 update_attempter.cc:505] Updating boot flags... Oct 2 19:16:09.866855 env[1138]: time="2023-10-02T19:16:09.866818094Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:09.885133 env[1138]: time="2023-10-02T19:16:09.885098921Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:09.893197 env[1138]: time="2023-10-02T19:16:09.893166530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:09.898001 env[1138]: time="2023-10-02T19:16:09.897982501Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:09.898431 env[1138]: time="2023-10-02T19:16:09.898407704Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8\"" Oct 2 19:16:09.905214 env[1138]: time="2023-10-02T19:16:09.905182292Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:16:10.810372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount681740027.mount: Deactivated successfully. Oct 2 19:16:11.196650 env[1138]: time="2023-10-02T19:16:11.196474731Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:11.197394 env[1138]: time="2023-10-02T19:16:11.197377597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:11.197987 env[1138]: time="2023-10-02T19:16:11.197973553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:11.198622 env[1138]: time="2023-10-02T19:16:11.198609126Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:11.198888 env[1138]: time="2023-10-02T19:16:11.198874736Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:16:11.205074 env[1138]: time="2023-10-02T19:16:11.205041104Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:16:11.696664 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1983151239.mount: Deactivated successfully. Oct 2 19:16:11.698556 env[1138]: time="2023-10-02T19:16:11.698522616Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:11.699506 env[1138]: time="2023-10-02T19:16:11.699492551Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:11.700359 env[1138]: time="2023-10-02T19:16:11.700347453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:11.701193 env[1138]: time="2023-10-02T19:16:11.701180898Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:11.701398 env[1138]: time="2023-10-02T19:16:11.701383369Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:16:11.706795 env[1138]: time="2023-10-02T19:16:11.706775597Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 19:16:15.045148 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:16:15.045272 systemd[1]: Stopped kubelet.service. Oct 2 19:16:15.046504 systemd[1]: Started kubelet.service. Oct 2 19:16:15.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.049760 kernel: kauditd_printk_skb: 259 callbacks suppressed Oct 2 19:16:15.049798 kernel: audit: type=1130 audit(1696274175.043:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.049820 kernel: audit: type=1131 audit(1696274175.043:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.054726 kernel: audit: type=1130 audit(1696274175.045:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.088815 kubelet[1618]: E1002 19:16:15.088781 1618 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:16:15.090828 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:16:15.090934 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:16:15.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:16:15.094574 kernel: audit: type=1131 audit(1696274175.089:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:16:15.833601 env[1138]: time="2023-10-02T19:16:15.833559605Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:15.907403 env[1138]: time="2023-10-02T19:16:15.907363581Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:15.914600 env[1138]: time="2023-10-02T19:16:15.914579226Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:15.922330 env[1138]: time="2023-10-02T19:16:15.922306373Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:15.923098 env[1138]: time="2023-10-02T19:16:15.923070637Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Oct 2 19:16:15.956265 env[1138]: time="2023-10-02T19:16:15.956234705Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:16:16.474513 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3209469906.mount: Deactivated successfully. Oct 2 19:16:17.072068 env[1138]: time="2023-10-02T19:16:17.072039787Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:17.072784 env[1138]: time="2023-10-02T19:16:17.072767044Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:17.073630 env[1138]: time="2023-10-02T19:16:17.073616529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:17.074383 env[1138]: time="2023-10-02T19:16:17.074369400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:17.074786 env[1138]: time="2023-10-02T19:16:17.074767992Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:16:18.482628 systemd[1]: Stopped kubelet.service. Oct 2 19:16:18.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:18.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:18.488019 kernel: audit: type=1130 audit(1696274178.482:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:18.488054 kernel: audit: type=1131 audit(1696274178.483:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:18.496456 systemd[1]: Reloading. Oct 2 19:16:18.546795 /usr/lib/systemd/system-generators/torcx-generator[1712]: time="2023-10-02T19:16:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:16:18.546994 /usr/lib/systemd/system-generators/torcx-generator[1712]: time="2023-10-02T19:16:18Z" level=info msg="torcx already run" Oct 2 19:16:18.598337 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:16:18.598352 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:16:18.610867 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:16:18.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.652092 kernel: audit: type=1400 audit(1696274178.646:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.652127 kernel: audit: type=1400 audit(1696274178.646:396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.652169 kernel: audit: type=1400 audit(1696274178.649:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.654430 kernel: audit: type=1400 audit(1696274178.649:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit: BPF prog-id=52 op=LOAD Oct 2 19:16:18.656000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit: BPF prog-id=53 op=LOAD Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit: BPF prog-id=54 op=LOAD Oct 2 19:16:18.657000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:16:18.657000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit: BPF prog-id=55 op=LOAD Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit: BPF prog-id=56 op=LOAD Oct 2 19:16:18.658000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:16:18.658000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.658000 audit: BPF prog-id=57 op=LOAD Oct 2 19:16:18.658000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.659000 audit: BPF prog-id=58 op=LOAD Oct 2 19:16:18.659000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.660000 audit: BPF prog-id=59 op=LOAD Oct 2 19:16:18.660000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:16:18.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit: BPF prog-id=60 op=LOAD Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.661000 audit: BPF prog-id=61 op=LOAD Oct 2 19:16:18.661000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:16:18.661000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit: BPF prog-id=62 op=LOAD Oct 2 19:16:18.662000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.662000 audit: BPF prog-id=63 op=LOAD Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.663000 audit: BPF prog-id=64 op=LOAD Oct 2 19:16:18.663000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:16:18.663000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit: BPF prog-id=65 op=LOAD Oct 2 19:16:18.665000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.666000 audit: BPF prog-id=66 op=LOAD Oct 2 19:16:18.666000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:16:18.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:18.679625 systemd[1]: Started kubelet.service. Oct 2 19:16:18.715113 kubelet[1773]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:16:18.715321 kubelet[1773]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:16:18.715360 kubelet[1773]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:16:18.715441 kubelet[1773]: I1002 19:16:18.715419 1773 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:16:18.883394 kubelet[1773]: I1002 19:16:18.883363 1773 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:16:18.883506 kubelet[1773]: I1002 19:16:18.883496 1773 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:16:18.883809 kubelet[1773]: I1002 19:16:18.883798 1773 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:16:18.937945 kubelet[1773]: I1002 19:16:18.937920 1773 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:16:18.941187 kubelet[1773]: E1002 19:16:18.941178 1773 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.108:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.943291 kubelet[1773]: I1002 19:16:18.943278 1773 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:16:18.943434 kubelet[1773]: I1002 19:16:18.943422 1773 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:16:18.943556 kubelet[1773]: I1002 19:16:18.943524 1773 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:16:18.943629 kubelet[1773]: I1002 19:16:18.943558 1773 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:16:18.943629 kubelet[1773]: I1002 19:16:18.943573 1773 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:16:18.943677 kubelet[1773]: I1002 19:16:18.943641 1773 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:16:18.943702 kubelet[1773]: I1002 19:16:18.943690 1773 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:16:18.943702 kubelet[1773]: I1002 19:16:18.943701 1773 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:16:18.943738 kubelet[1773]: I1002 19:16:18.943715 1773 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:16:18.943738 kubelet[1773]: I1002 19:16:18.943725 1773 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:16:18.944618 kubelet[1773]: I1002 19:16:18.944604 1773 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:16:18.944751 kubelet[1773]: W1002 19:16:18.944740 1773 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:16:18.945030 kubelet[1773]: I1002 19:16:18.945018 1773 server.go:1232] "Started kubelet" Oct 2 19:16:18.945106 kubelet[1773]: W1002 19:16:18.945076 1773 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.945152 kubelet[1773]: E1002 19:16:18.945111 1773 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.945173 kubelet[1773]: W1002 19:16:18.945145 1773 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.945199 kubelet[1773]: E1002 19:16:18.945172 1773 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.947829 kubelet[1773]: I1002 19:16:18.947814 1773 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:16:18.947970 kubelet[1773]: I1002 19:16:18.947957 1773 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:16:18.948121 kubelet[1773]: I1002 19:16:18.948102 1773 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:16:18.948290 kubelet[1773]: E1002 19:16:18.948232 1773 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.178a6060e5af2ed2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 16, 18, 945003218, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 16, 18, 945003218, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'Post "https://139.178.70.108:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.108:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:16:18.948507 kubelet[1773]: I1002 19:16:18.948501 1773 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:16:18.948805 kubelet[1773]: E1002 19:16:18.948793 1773 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:16:18.948805 kubelet[1773]: E1002 19:16:18.948806 1773 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:16:18.949000 audit[1773]: AVC avc: denied { mac_admin } for pid=1773 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.949000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:16:18.949000 audit[1773]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000809b60 a1=c000c91e90 a2=c000809b30 a3=25 items=0 ppid=1 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.949000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:16:18.949000 audit[1773]: AVC avc: denied { mac_admin } for pid=1773 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.949000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:16:18.949000 audit[1773]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c18280 a1=c000c91ea8 a2=c000809bf0 a3=25 items=0 ppid=1 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.949000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:16:18.950014 kubelet[1773]: I1002 19:16:18.949727 1773 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:16:18.950014 kubelet[1773]: I1002 19:16:18.949752 1773 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:16:18.950014 kubelet[1773]: I1002 19:16:18.949789 1773 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:16:18.950000 audit[1783]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:18.950000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd5111e40 a2=0 a3=7ffdd5111e2c items=0 ppid=1773 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:16:18.951000 audit[1784]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:18.952011 kubelet[1773]: E1002 19:16:18.952003 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:18.952076 kubelet[1773]: I1002 19:16:18.952069 1773 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:16:18.952179 kubelet[1773]: I1002 19:16:18.952172 1773 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:16:18.951000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa3aec9e0 a2=0 a3=7fffa3aec9cc items=0 ppid=1773 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:16:18.952339 kubelet[1773]: I1002 19:16:18.952332 1773 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:16:18.952564 kubelet[1773]: W1002 19:16:18.952531 1773 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.952624 kubelet[1773]: E1002 19:16:18.952615 1773 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.953253 kubelet[1773]: E1002 19:16:18.953246 1773 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="200ms" Oct 2 19:16:18.954000 audit[1786]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:18.954000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd4597ad0 a2=0 a3=7fffd4597abc items=0 ppid=1773 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:16:18.955000 audit[1788]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:18.955000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe96ece7d0 a2=0 a3=7ffe96ece7bc items=0 ppid=1773 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:16:18.962000 audit[1792]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:18.962000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffefc2e5b70 a2=0 a3=7ffefc2e5b5c items=0 ppid=1773 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:16:18.964211 kubelet[1773]: I1002 19:16:18.964192 1773 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:16:18.964000 audit[1793]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:18.964000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc0c172b0 a2=0 a3=7ffcc0c1729c items=0 ppid=1773 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:16:18.964851 kubelet[1773]: I1002 19:16:18.964824 1773 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:16:18.964851 kubelet[1773]: I1002 19:16:18.964838 1773 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:16:18.964851 kubelet[1773]: I1002 19:16:18.964849 1773 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:16:18.964910 kubelet[1773]: E1002 19:16:18.964876 1773 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:16:18.965000 audit[1794]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:18.965000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef0ad56f0 a2=0 a3=7ffef0ad56dc items=0 ppid=1773 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:16:18.965000 audit[1795]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:18.965000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc78988000 a2=0 a3=7ffc78987fec items=0 ppid=1773 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:16:18.967000 audit[1796]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:18.967000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6f43c6b0 a2=0 a3=7ffe6f43c69c items=0 ppid=1773 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:16:18.967000 audit[1797]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:18.967000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5b1ddf70 a2=0 a3=7ffd5b1ddf5c items=0 ppid=1773 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:16:18.968000 audit[1798]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:18.968000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff58790040 a2=0 a3=7fff5879002c items=0 ppid=1773 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:16:18.969000 audit[1800]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:18.969000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca37424c0 a2=0 a3=7ffca37424ac items=0 ppid=1773 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:16:18.971010 kubelet[1773]: W1002 19:16:18.970984 1773 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.971053 kubelet[1773]: E1002 19:16:18.971014 1773 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:18.973249 kubelet[1773]: I1002 19:16:18.973237 1773 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:16:18.973249 kubelet[1773]: I1002 19:16:18.973248 1773 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:16:18.973307 kubelet[1773]: I1002 19:16:18.973256 1773 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:16:18.974074 kubelet[1773]: I1002 19:16:18.974061 1773 policy_none.go:49] "None policy: Start" Oct 2 19:16:18.974310 kubelet[1773]: I1002 19:16:18.974300 1773 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:16:18.974342 kubelet[1773]: I1002 19:16:18.974312 1773 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:16:18.976760 systemd[1]: Created slice kubepods.slice. Oct 2 19:16:18.979360 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:16:18.981115 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:16:18.986072 kubelet[1773]: I1002 19:16:18.986063 1773 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:16:18.985000 audit[1773]: AVC avc: denied { mac_admin } for pid=1773 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.985000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:16:18.985000 audit[1773]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00047acc0 a1=c000c90978 a2=c00047ac90 a3=25 items=0 ppid=1 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.985000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:16:18.986312 kubelet[1773]: I1002 19:16:18.986305 1773 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:16:18.986435 kubelet[1773]: I1002 19:16:18.986428 1773 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:16:18.987328 kubelet[1773]: E1002 19:16:18.987321 1773 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Oct 2 19:16:19.054184 kubelet[1773]: I1002 19:16:19.054161 1773 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:16:19.054539 kubelet[1773]: E1002 19:16:19.054528 1773 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Oct 2 19:16:19.065666 kubelet[1773]: I1002 19:16:19.065654 1773 topology_manager.go:215] "Topology Admit Handler" podUID="6961ff1365464b1e2d286a48d6c5e40f" podNamespace="kube-system" podName="kube-controller-manager-localhost" Oct 2 19:16:19.066382 kubelet[1773]: I1002 19:16:19.066372 1773 topology_manager.go:215] "Topology Admit Handler" podUID="b619222ebfcfd1a0c9478200f0921497" podNamespace="kube-system" podName="kube-scheduler-localhost" Oct 2 19:16:19.067259 kubelet[1773]: I1002 19:16:19.067249 1773 topology_manager.go:215] "Topology Admit Handler" podUID="5f4e3f6271217a3d6fadf54968252ffe" podNamespace="kube-system" podName="kube-apiserver-localhost" Oct 2 19:16:19.071976 systemd[1]: Created slice kubepods-burstable-pod6961ff1365464b1e2d286a48d6c5e40f.slice. Oct 2 19:16:19.080360 systemd[1]: Created slice kubepods-burstable-podb619222ebfcfd1a0c9478200f0921497.slice. Oct 2 19:16:19.083898 systemd[1]: Created slice kubepods-burstable-pod5f4e3f6271217a3d6fadf54968252ffe.slice. Oct 2 19:16:19.153336 kubelet[1773]: I1002 19:16:19.153260 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:19.153336 kubelet[1773]: I1002 19:16:19.153295 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:19.153336 kubelet[1773]: I1002 19:16:19.153313 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b619222ebfcfd1a0c9478200f0921497-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b619222ebfcfd1a0c9478200f0921497\") " pod="kube-system/kube-scheduler-localhost" Oct 2 19:16:19.156143 kubelet[1773]: E1002 19:16:19.156121 1773 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="400ms" Oct 2 19:16:19.156143 kubelet[1773]: I1002 19:16:19.156144 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5f4e3f6271217a3d6fadf54968252ffe-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5f4e3f6271217a3d6fadf54968252ffe\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:16:19.156272 kubelet[1773]: I1002 19:16:19.156169 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5f4e3f6271217a3d6fadf54968252ffe-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5f4e3f6271217a3d6fadf54968252ffe\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:16:19.156272 kubelet[1773]: I1002 19:16:19.156229 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:19.156272 kubelet[1773]: I1002 19:16:19.156250 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:19.156272 kubelet[1773]: I1002 19:16:19.156265 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:19.156272 kubelet[1773]: I1002 19:16:19.156280 1773 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5f4e3f6271217a3d6fadf54968252ffe-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5f4e3f6271217a3d6fadf54968252ffe\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:16:19.256612 kubelet[1773]: I1002 19:16:19.256593 1773 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:16:19.257028 kubelet[1773]: E1002 19:16:19.256997 1773 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Oct 2 19:16:19.380412 env[1138]: time="2023-10-02T19:16:19.380345218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:6961ff1365464b1e2d286a48d6c5e40f,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:19.382734 env[1138]: time="2023-10-02T19:16:19.382712333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b619222ebfcfd1a0c9478200f0921497,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:19.386665 env[1138]: time="2023-10-02T19:16:19.386647177Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5f4e3f6271217a3d6fadf54968252ffe,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:19.557017 kubelet[1773]: E1002 19:16:19.557000 1773 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="800ms" Oct 2 19:16:19.658714 kubelet[1773]: I1002 19:16:19.658694 1773 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:16:19.659037 kubelet[1773]: E1002 19:16:19.659027 1773 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Oct 2 19:16:19.827237 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1498084663.mount: Deactivated successfully. Oct 2 19:16:19.829520 env[1138]: time="2023-10-02T19:16:19.829502036Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.830069 env[1138]: time="2023-10-02T19:16:19.830036853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.830445 env[1138]: time="2023-10-02T19:16:19.830411655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.831568 env[1138]: time="2023-10-02T19:16:19.831527997Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.832259 env[1138]: time="2023-10-02T19:16:19.832242912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.832919 env[1138]: time="2023-10-02T19:16:19.832904562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.834204 env[1138]: time="2023-10-02T19:16:19.834190911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.835837 env[1138]: time="2023-10-02T19:16:19.835821555Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.838198 env[1138]: time="2023-10-02T19:16:19.838179274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.838931 env[1138]: time="2023-10-02T19:16:19.838920020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.842642 env[1138]: time="2023-10-02T19:16:19.842629489Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.854559 env[1138]: time="2023-10-02T19:16:19.849796869Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:19.854559 env[1138]: time="2023-10-02T19:16:19.849815368Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:19.854559 env[1138]: time="2023-10-02T19:16:19.849821906Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:19.854559 env[1138]: time="2023-10-02T19:16:19.849883017Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b4b9a989e91a9dac6fe95f251ec3904b6897592af5c92c5ca316e7000304a4fe pid=1816 runtime=io.containerd.runc.v2 Oct 2 19:16:19.854832 env[1138]: time="2023-10-02T19:16:19.849737191Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:19.854832 env[1138]: time="2023-10-02T19:16:19.849757893Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:19.854832 env[1138]: time="2023-10-02T19:16:19.849764415Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:19.854832 env[1138]: time="2023-10-02T19:16:19.849824964Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/54cb0142be862bcfff80fdcb71d494db22194da6363ba4a03dca108932224e79 pid=1819 runtime=io.containerd.runc.v2 Oct 2 19:16:19.855044 env[1138]: time="2023-10-02T19:16:19.855029258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:19.872371 systemd[1]: Started cri-containerd-b4b9a989e91a9dac6fe95f251ec3904b6897592af5c92c5ca316e7000304a4fe.scope. Oct 2 19:16:19.874422 systemd[1]: Started cri-containerd-54cb0142be862bcfff80fdcb71d494db22194da6363ba4a03dca108932224e79.scope. Oct 2 19:16:19.884311 env[1138]: time="2023-10-02T19:16:19.884274855Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:19.884438 env[1138]: time="2023-10-02T19:16:19.884424888Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:19.884503 env[1138]: time="2023-10-02T19:16:19.884488915Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.884000 audit: BPF prog-id=67 op=LOAD Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1816 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623961393839653931613964616336666539356632353165633339 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885934 env[1138]: time="2023-10-02T19:16:19.885387077Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1aa80864f12fe6e5e930776e45c7dd6733e464abd1b748b2c66e93b9a0f864c pid=1861 runtime=io.containerd.runc.v2 Oct 2 19:16:19.885000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1816 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623961393839653931613964616336666539356632353165633339 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit: BPF prog-id=68 op=LOAD Oct 2 19:16:19.885000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00021b730 items=0 ppid=1816 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623961393839653931613964616336666539356632353165633339 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.885000 audit: BPF prog-id=69 op=LOAD Oct 2 19:16:19.885000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00021b778 items=0 ppid=1816 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623961393839653931613964616336666539356632353165633339 Oct 2 19:16:19.886000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:16:19.886000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.886000 audit: BPF prog-id=70 op=LOAD Oct 2 19:16:19.886000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00021bb88 items=0 ppid=1816 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623961393839653931613964616336666539356632353165633339 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.888000 audit: BPF prog-id=71 op=LOAD Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1819 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534636230313432626538363262636666663830666463623731643439 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1819 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534636230313432626538363262636666663830666463623731643439 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit: BPF prog-id=72 op=LOAD Oct 2 19:16:19.889000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003eac00 items=0 ppid=1819 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534636230313432626538363262636666663830666463623731643439 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit: BPF prog-id=73 op=LOAD Oct 2 19:16:19.889000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003eac48 items=0 ppid=1819 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534636230313432626538363262636666663830666463623731643439 Oct 2 19:16:19.889000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:16:19.889000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.889000 audit: BPF prog-id=74 op=LOAD Oct 2 19:16:19.889000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003eb058 items=0 ppid=1819 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534636230313432626538363262636666663830666463623731643439 Oct 2 19:16:19.900459 systemd[1]: Started cri-containerd-d1aa80864f12fe6e5e930776e45c7dd6733e464abd1b748b2c66e93b9a0f864c.scope. Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.916000 audit: BPF prog-id=75 op=LOAD Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1861 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616138303836346631326665366535653933303737366534356337 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=1861 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616138303836346631326665366535653933303737366534356337 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit: BPF prog-id=76 op=LOAD Oct 2 19:16:19.917000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000098f00 items=0 ppid=1861 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616138303836346631326665366535653933303737366534356337 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919112 env[1138]: time="2023-10-02T19:16:19.919092034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:6961ff1365464b1e2d286a48d6c5e40f,Namespace:kube-system,Attempt:0,} returns sandbox id \"54cb0142be862bcfff80fdcb71d494db22194da6363ba4a03dca108932224e79\"" Oct 2 19:16:19.917000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.917000 audit: BPF prog-id=77 op=LOAD Oct 2 19:16:19.917000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000098f48 items=0 ppid=1861 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616138303836346631326665366535653933303737366534356337 Oct 2 19:16:19.919000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:16:19.919000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.919000 audit: BPF prog-id=78 op=LOAD Oct 2 19:16:19.919000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000099358 items=0 ppid=1861 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616138303836346631326665366535653933303737366534356337 Oct 2 19:16:19.921354 env[1138]: time="2023-10-02T19:16:19.921340780Z" level=info msg="CreateContainer within sandbox \"54cb0142be862bcfff80fdcb71d494db22194da6363ba4a03dca108932224e79\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:16:19.932957 env[1138]: time="2023-10-02T19:16:19.932934083Z" level=info msg="CreateContainer within sandbox \"54cb0142be862bcfff80fdcb71d494db22194da6363ba4a03dca108932224e79\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ff6da514730f68ded7c0bdf66bea074ca9705c7a4ccb93fe118ae31b70c86d81\"" Oct 2 19:16:19.936798 env[1138]: time="2023-10-02T19:16:19.936768498Z" level=info msg="StartContainer for \"ff6da514730f68ded7c0bdf66bea074ca9705c7a4ccb93fe118ae31b70c86d81\"" Oct 2 19:16:19.942327 env[1138]: time="2023-10-02T19:16:19.942303745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b619222ebfcfd1a0c9478200f0921497,Namespace:kube-system,Attempt:0,} returns sandbox id \"b4b9a989e91a9dac6fe95f251ec3904b6897592af5c92c5ca316e7000304a4fe\"" Oct 2 19:16:19.943599 env[1138]: time="2023-10-02T19:16:19.943581918Z" level=info msg="CreateContainer within sandbox \"b4b9a989e91a9dac6fe95f251ec3904b6897592af5c92c5ca316e7000304a4fe\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:16:19.951700 systemd[1]: Started cri-containerd-ff6da514730f68ded7c0bdf66bea074ca9705c7a4ccb93fe118ae31b70c86d81.scope. Oct 2 19:16:19.959746 env[1138]: time="2023-10-02T19:16:19.959698756Z" level=info msg="CreateContainer within sandbox \"b4b9a989e91a9dac6fe95f251ec3904b6897592af5c92c5ca316e7000304a4fe\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c6a77bba6d0dd030e9317e05f5842e025cd8d909c868873725b31848c6192bfb\"" Oct 2 19:16:19.960148 env[1138]: time="2023-10-02T19:16:19.960064516Z" level=info msg="StartContainer for \"c6a77bba6d0dd030e9317e05f5842e025cd8d909c868873725b31848c6192bfb\"" Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit: BPF prog-id=79 op=LOAD Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1819 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366461353134373330663638646564376330626466363662656130 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1819 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366461353134373330663638646564376330626466363662656130 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.961000 audit: BPF prog-id=80 op=LOAD Oct 2 19:16:19.961000 audit[1927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000239ad0 items=0 ppid=1819 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366461353134373330663638646564376330626466363662656130 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit: BPF prog-id=81 op=LOAD Oct 2 19:16:19.962000 audit[1927]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000239b18 items=0 ppid=1819 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366461353134373330663638646564376330626466363662656130 Oct 2 19:16:19.962000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:16:19.962000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { perfmon } for pid=1927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit[1927]: AVC avc: denied { bpf } for pid=1927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.962000 audit: BPF prog-id=82 op=LOAD Oct 2 19:16:19.962000 audit[1927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000239f28 items=0 ppid=1819 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366461353134373330663638646564376330626466363662656130 Oct 2 19:16:19.972043 env[1138]: time="2023-10-02T19:16:19.972021851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5f4e3f6271217a3d6fadf54968252ffe,Namespace:kube-system,Attempt:0,} returns sandbox id \"d1aa80864f12fe6e5e930776e45c7dd6733e464abd1b748b2c66e93b9a0f864c\"" Oct 2 19:16:19.973306 env[1138]: time="2023-10-02T19:16:19.973293005Z" level=info msg="CreateContainer within sandbox \"d1aa80864f12fe6e5e930776e45c7dd6733e464abd1b748b2c66e93b9a0f864c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:16:19.982801 systemd[1]: Started cri-containerd-c6a77bba6d0dd030e9317e05f5842e025cd8d909c868873725b31848c6192bfb.scope. Oct 2 19:16:19.984968 env[1138]: time="2023-10-02T19:16:19.984257679Z" level=info msg="CreateContainer within sandbox \"d1aa80864f12fe6e5e930776e45c7dd6733e464abd1b748b2c66e93b9a0f864c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"11b46a745e696e2f1dad96d0dab8117fd97576094f82f99189515e8e30d07ad2\"" Oct 2 19:16:19.985278 env[1138]: time="2023-10-02T19:16:19.985265535Z" level=info msg="StartContainer for \"11b46a745e696e2f1dad96d0dab8117fd97576094f82f99189515e8e30d07ad2\"" Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit: BPF prog-id=83 op=LOAD Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1816 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613737626261366430646430333065393331376530356635383432 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1816 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613737626261366430646430333065393331376530356635383432 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit: BPF prog-id=84 op=LOAD Oct 2 19:16:19.992000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ea5b0 items=0 ppid=1816 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613737626261366430646430333065393331376530356635383432 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit: BPF prog-id=85 op=LOAD Oct 2 19:16:19.992000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ea5f8 items=0 ppid=1816 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613737626261366430646430333065393331376530356635383432 Oct 2 19:16:19.992000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:16:19.992000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:19.992000 audit: BPF prog-id=86 op=LOAD Oct 2 19:16:19.992000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003eaa08 items=0 ppid=1816 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613737626261366430646430333065393331376530356635383432 Oct 2 19:16:20.000695 systemd[1]: Started cri-containerd-11b46a745e696e2f1dad96d0dab8117fd97576094f82f99189515e8e30d07ad2.scope. Oct 2 19:16:20.005965 kubelet[1773]: W1002 19:16:20.005912 1773 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:20.005965 kubelet[1773]: E1002 19:16:20.005947 1773 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:20.006245 env[1138]: time="2023-10-02T19:16:20.006226472Z" level=info msg="StartContainer for \"ff6da514730f68ded7c0bdf66bea074ca9705c7a4ccb93fe118ae31b70c86d81\" returns successfully" Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.016000 audit: BPF prog-id=87 op=LOAD Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1861 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:20.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623436613734356536393665326631646164393664306461623831 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1861 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:20.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623436613734356536393665326631646164393664306461623831 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit: BPF prog-id=88 op=LOAD Oct 2 19:16:20.017000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000395340 items=0 ppid=1861 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:20.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623436613734356536393665326631646164393664306461623831 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit: BPF prog-id=89 op=LOAD Oct 2 19:16:20.017000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000395388 items=0 ppid=1861 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:20.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623436613734356536393665326631646164393664306461623831 Oct 2 19:16:20.017000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:16:20.017000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:20.017000 audit: BPF prog-id=90 op=LOAD Oct 2 19:16:20.017000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000395798 items=0 ppid=1861 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:20.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623436613734356536393665326631646164393664306461623831 Oct 2 19:16:20.022707 env[1138]: time="2023-10-02T19:16:20.022685374Z" level=info msg="StartContainer for \"c6a77bba6d0dd030e9317e05f5842e025cd8d909c868873725b31848c6192bfb\" returns successfully" Oct 2 19:16:20.043517 env[1138]: time="2023-10-02T19:16:20.043494918Z" level=info msg="StartContainer for \"11b46a745e696e2f1dad96d0dab8117fd97576094f82f99189515e8e30d07ad2\" returns successfully" Oct 2 19:16:20.070435 kubelet[1773]: W1002 19:16:20.070401 1773 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:20.070435 kubelet[1773]: E1002 19:16:20.070440 1773 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:20.335325 kubelet[1773]: W1002 19:16:20.335279 1773 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:20.335325 kubelet[1773]: E1002 19:16:20.335316 1773 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:20.357726 kubelet[1773]: E1002 19:16:20.357701 1773 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="1.6s" Oct 2 19:16:20.460121 kubelet[1773]: I1002 19:16:20.459917 1773 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:16:20.460121 kubelet[1773]: E1002 19:16:20.460101 1773 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Oct 2 19:16:20.461502 kubelet[1773]: W1002 19:16:20.461462 1773 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:20.461502 kubelet[1773]: E1002 19:16:20.461490 1773 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Oct 2 19:16:21.011000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.012633 kernel: kauditd_printk_skb: 559 callbacks suppressed Oct 2 19:16:21.012676 kernel: audit: type=1400 audit(1696274181.011:691): avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.011000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000233350 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:21.019713 kernel: audit: type=1300 audit(1696274181.011:691): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000233350 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:21.011000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:21.026924 kernel: audit: type=1327 audit(1696274181.011:691): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:21.026955 kernel: audit: type=1400 audit(1696274181.011:692): avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.011000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.030962 kernel: audit: type=1300 audit(1696274181.011:692): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00113c040 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:21.011000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00113c040 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:21.034318 kernel: audit: type=1327 audit(1696274181.011:692): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:21.011000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:21.564000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=4801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.564000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003c5c7b0 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:16:21.572048 kernel: audit: type=1400 audit(1696274181.564:693): avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=4801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.572096 kernel: audit: type=1300 audit(1696274181.564:693): arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003c5c7b0 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:16:21.564000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:16:21.571000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.579076 kernel: audit: type=1327 audit(1696274181.564:693): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:16:21.579120 kernel: audit: type=1400 audit(1696274181.571:694): avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.571000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003c5c870 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:16:21.571000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:16:21.572000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.572000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c00611ca40 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:16:21.572000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:16:21.580000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=4807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.580000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c003d10c00 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:16:21.580000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:16:21.601000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.601000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00461aaa0 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:16:21.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:16:21.601000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:21.601000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00485b7a0 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:16:21.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:16:21.966119 kubelet[1773]: E1002 19:16:21.966048 1773 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Oct 2 19:16:21.994337 kubelet[1773]: E1002 19:16:21.994312 1773 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Oct 2 19:16:22.061388 kubelet[1773]: I1002 19:16:22.061359 1773 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:16:22.068462 kubelet[1773]: I1002 19:16:22.068446 1773 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Oct 2 19:16:22.075104 kubelet[1773]: E1002 19:16:22.075090 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:22.175611 kubelet[1773]: E1002 19:16:22.175583 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:22.276033 kubelet[1773]: E1002 19:16:22.275947 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:22.376373 kubelet[1773]: E1002 19:16:22.376344 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:22.476898 kubelet[1773]: E1002 19:16:22.476866 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:22.577326 kubelet[1773]: E1002 19:16:22.577299 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:22.677752 kubelet[1773]: E1002 19:16:22.677729 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:22.778184 kubelet[1773]: E1002 19:16:22.778157 1773 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:16:22.945883 kubelet[1773]: I1002 19:16:22.945779 1773 apiserver.go:52] "Watching apiserver" Oct 2 19:16:22.953163 kubelet[1773]: I1002 19:16:22.953146 1773 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:16:24.238792 systemd[1]: Reloading. Oct 2 19:16:24.311950 /usr/lib/systemd/system-generators/torcx-generator[2064]: time="2023-10-02T19:16:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:16:24.311968 /usr/lib/systemd/system-generators/torcx-generator[2064]: time="2023-10-02T19:16:24Z" level=info msg="torcx already run" Oct 2 19:16:24.378243 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:16:24.378257 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:16:24.391202 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit: BPF prog-id=91 op=LOAD Oct 2 19:16:24.439000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit: BPF prog-id=92 op=LOAD Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit: BPF prog-id=93 op=LOAD Oct 2 19:16:24.439000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:16:24.439000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit: BPF prog-id=94 op=LOAD Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit: BPF prog-id=95 op=LOAD Oct 2 19:16:24.439000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:16:24.439000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.439000 audit: BPF prog-id=96 op=LOAD Oct 2 19:16:24.439000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit: BPF prog-id=97 op=LOAD Oct 2 19:16:24.440000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit: BPF prog-id=98 op=LOAD Oct 2 19:16:24.440000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.440000 audit: BPF prog-id=99 op=LOAD Oct 2 19:16:24.440000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.441000 audit: BPF prog-id=100 op=LOAD Oct 2 19:16:24.441000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit: BPF prog-id=101 op=LOAD Oct 2 19:16:24.442000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit: BPF prog-id=102 op=LOAD Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit: BPF prog-id=103 op=LOAD Oct 2 19:16:24.442000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:16:24.442000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit: BPF prog-id=104 op=LOAD Oct 2 19:16:24.443000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit: BPF prog-id=105 op=LOAD Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit: BPF prog-id=106 op=LOAD Oct 2 19:16:24.443000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:16:24.443000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.443000 audit: BPF prog-id=107 op=LOAD Oct 2 19:16:24.443000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.444000 audit: BPF prog-id=108 op=LOAD Oct 2 19:16:24.444000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.445000 audit: BPF prog-id=109 op=LOAD Oct 2 19:16:24.445000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit: BPF prog-id=110 op=LOAD Oct 2 19:16:24.446000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.446000 audit: BPF prog-id=111 op=LOAD Oct 2 19:16:24.446000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:16:24.458369 systemd[1]: Stopping kubelet.service... Oct 2 19:16:24.474767 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:16:24.474886 systemd[1]: Stopped kubelet.service. Oct 2 19:16:24.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:24.476214 systemd[1]: Started kubelet.service. Oct 2 19:16:24.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:24.534475 kubelet[2123]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:16:24.534475 kubelet[2123]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:16:24.534475 kubelet[2123]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:16:24.534475 kubelet[2123]: I1002 19:16:24.529597 2123 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:16:24.534475 kubelet[2123]: I1002 19:16:24.534349 2123 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:16:24.534475 kubelet[2123]: I1002 19:16:24.534363 2123 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:16:24.534798 kubelet[2123]: I1002 19:16:24.534539 2123 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:16:24.535836 kubelet[2123]: I1002 19:16:24.535820 2123 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:16:24.536666 kubelet[2123]: I1002 19:16:24.536630 2123 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:16:24.539751 kubelet[2123]: I1002 19:16:24.539729 2123 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:16:24.539889 kubelet[2123]: I1002 19:16:24.539875 2123 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:16:24.539996 kubelet[2123]: I1002 19:16:24.539982 2123 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:16:24.540123 kubelet[2123]: I1002 19:16:24.539999 2123 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:16:24.540123 kubelet[2123]: I1002 19:16:24.540004 2123 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:16:24.540123 kubelet[2123]: I1002 19:16:24.540023 2123 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:16:24.540123 kubelet[2123]: I1002 19:16:24.540068 2123 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:16:24.540123 kubelet[2123]: I1002 19:16:24.540076 2123 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:16:24.540123 kubelet[2123]: I1002 19:16:24.540089 2123 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:16:24.540123 kubelet[2123]: I1002 19:16:24.540097 2123 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:16:24.542000 audit[2123]: AVC avc: denied { mac_admin } for pid=2123 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.542000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:16:24.542000 audit[2123]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aa53b0 a1=c000ada5a0 a2=c000aa5380 a3=25 items=0 ppid=1 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:24.542000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:16:24.542000 audit[2123]: AVC avc: denied { mac_admin } for pid=2123 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.542000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:16:24.542000 audit[2123]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007f1ae0 a1=c000ada5b8 a2=c000aa5440 a3=25 items=0 ppid=1 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:24.542000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:16:24.543755 kubelet[2123]: I1002 19:16:24.541857 2123 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:16:24.543755 kubelet[2123]: I1002 19:16:24.542160 2123 server.go:1232] "Started kubelet" Oct 2 19:16:24.543755 kubelet[2123]: I1002 19:16:24.543169 2123 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:16:24.543755 kubelet[2123]: I1002 19:16:24.543196 2123 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:16:24.543755 kubelet[2123]: I1002 19:16:24.543215 2123 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:16:24.551574 kubelet[2123]: E1002 19:16:24.550422 2123 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:16:24.551574 kubelet[2123]: E1002 19:16:24.550457 2123 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:16:24.554028 kubelet[2123]: I1002 19:16:24.554003 2123 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:16:24.554625 kubelet[2123]: I1002 19:16:24.554611 2123 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:16:24.555592 kubelet[2123]: I1002 19:16:24.555576 2123 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:16:24.555800 kubelet[2123]: I1002 19:16:24.555789 2123 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:16:24.556630 kubelet[2123]: I1002 19:16:24.556615 2123 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:16:24.556782 kubelet[2123]: I1002 19:16:24.556771 2123 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:16:24.557768 kubelet[2123]: I1002 19:16:24.557751 2123 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:16:24.569671 kubelet[2123]: I1002 19:16:24.569655 2123 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:16:24.570328 kubelet[2123]: I1002 19:16:24.570319 2123 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:16:24.570402 kubelet[2123]: I1002 19:16:24.570395 2123 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:16:24.570454 kubelet[2123]: I1002 19:16:24.570448 2123 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:16:24.570525 kubelet[2123]: E1002 19:16:24.570519 2123 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:16:24.608943 kubelet[2123]: I1002 19:16:24.608929 2123 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:16:24.609044 kubelet[2123]: I1002 19:16:24.609037 2123 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:16:24.609091 kubelet[2123]: I1002 19:16:24.609085 2123 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:16:24.609470 kubelet[2123]: I1002 19:16:24.609464 2123 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:16:24.609533 kubelet[2123]: I1002 19:16:24.609520 2123 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 19:16:24.609588 kubelet[2123]: I1002 19:16:24.609581 2123 policy_none.go:49] "None policy: Start" Oct 2 19:16:24.610002 kubelet[2123]: I1002 19:16:24.609995 2123 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:16:24.610051 kubelet[2123]: I1002 19:16:24.610044 2123 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:16:24.610395 kubelet[2123]: I1002 19:16:24.610388 2123 state_mem.go:75] "Updated machine memory state" Oct 2 19:16:24.612652 kubelet[2123]: I1002 19:16:24.612644 2123 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:16:24.612000 audit[2123]: AVC avc: denied { mac_admin } for pid=2123 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:24.612000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:16:24.612000 audit[2123]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0012d60c0 a1=c001283f08 a2=c0012d6090 a3=25 items=0 ppid=1 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:24.612000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:16:24.613650 kubelet[2123]: I1002 19:16:24.613575 2123 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:16:24.614109 kubelet[2123]: I1002 19:16:24.613953 2123 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:16:24.656038 kubelet[2123]: I1002 19:16:24.656020 2123 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:16:24.660852 kubelet[2123]: I1002 19:16:24.660832 2123 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Oct 2 19:16:24.661012 kubelet[2123]: I1002 19:16:24.661005 2123 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Oct 2 19:16:24.671651 kubelet[2123]: I1002 19:16:24.671628 2123 topology_manager.go:215] "Topology Admit Handler" podUID="5f4e3f6271217a3d6fadf54968252ffe" podNamespace="kube-system" podName="kube-apiserver-localhost" Oct 2 19:16:24.671871 kubelet[2123]: I1002 19:16:24.671853 2123 topology_manager.go:215] "Topology Admit Handler" podUID="6961ff1365464b1e2d286a48d6c5e40f" podNamespace="kube-system" podName="kube-controller-manager-localhost" Oct 2 19:16:24.672319 kubelet[2123]: I1002 19:16:24.672311 2123 topology_manager.go:215] "Topology Admit Handler" podUID="b619222ebfcfd1a0c9478200f0921497" podNamespace="kube-system" podName="kube-scheduler-localhost" Oct 2 19:16:24.675703 kubelet[2123]: E1002 19:16:24.675681 2123 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 2 19:16:24.755982 kubelet[2123]: I1002 19:16:24.755963 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:24.756106 kubelet[2123]: I1002 19:16:24.756097 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:24.756175 kubelet[2123]: I1002 19:16:24.756168 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b619222ebfcfd1a0c9478200f0921497-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b619222ebfcfd1a0c9478200f0921497\") " pod="kube-system/kube-scheduler-localhost" Oct 2 19:16:24.756265 kubelet[2123]: I1002 19:16:24.756221 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:24.756342 kubelet[2123]: I1002 19:16:24.756335 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:24.756431 kubelet[2123]: I1002 19:16:24.756423 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5f4e3f6271217a3d6fadf54968252ffe-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5f4e3f6271217a3d6fadf54968252ffe\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:16:24.756531 kubelet[2123]: I1002 19:16:24.756523 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:24.756617 kubelet[2123]: I1002 19:16:24.756611 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5f4e3f6271217a3d6fadf54968252ffe-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5f4e3f6271217a3d6fadf54968252ffe\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:16:24.756686 kubelet[2123]: I1002 19:16:24.756679 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5f4e3f6271217a3d6fadf54968252ffe-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5f4e3f6271217a3d6fadf54968252ffe\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:16:25.545568 kubelet[2123]: I1002 19:16:25.545536 2123 apiserver.go:52] "Watching apiserver" Oct 2 19:16:25.556279 kubelet[2123]: I1002 19:16:25.556257 2123 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:16:25.649363 kubelet[2123]: E1002 19:16:25.649330 2123 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 2 19:16:25.649662 kubelet[2123]: E1002 19:16:25.649650 2123 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Oct 2 19:16:25.729939 kubelet[2123]: I1002 19:16:25.729912 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.729874754 podCreationTimestamp="2023-10-02 19:16:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:25.696823573 +0000 UTC m=+1.213197245" watchObservedRunningTime="2023-10-02 19:16:25.729874754 +0000 UTC m=+1.246248425" Oct 2 19:16:25.761552 kubelet[2123]: I1002 19:16:25.761523 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.761496426 podCreationTimestamp="2023-10-02 19:16:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:25.738419747 +0000 UTC m=+1.254793420" watchObservedRunningTime="2023-10-02 19:16:25.761496426 +0000 UTC m=+1.277870097" Oct 2 19:16:25.822609 kubelet[2123]: I1002 19:16:25.822549 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.822517408 podCreationTimestamp="2023-10-02 19:16:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:25.763250845 +0000 UTC m=+1.279624517" watchObservedRunningTime="2023-10-02 19:16:25.822517408 +0000 UTC m=+1.338891070" Oct 2 19:16:25.968000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:25.968000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00113c7a0 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:25.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:25.968000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:25.968000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e27ce0 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:25.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:25.968000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:25.968000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e27d20 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:25.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:25.969000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:25.969000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e27d60 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:25.969000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:27.181825 kernel: kauditd_printk_skb: 284 callbacks suppressed Oct 2 19:16:27.181938 kernel: audit: type=1400 audit(1696274187.177:952): avc: denied { watch } for pid=1940 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=4832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:16:27.177000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=4832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:16:27.177000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008ae600 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:27.187036 kernel: audit: type=1300 audit(1696274187.177:952): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008ae600 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:16:27.177000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:27.190394 kernel: audit: type=1327 audit(1696274187.177:952): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:28.768044 sudo[1343]: pam_unix(sudo:session): session closed for user root Oct 2 19:16:28.767000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:28.767000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:28.774164 kernel: audit: type=1106 audit(1696274188.767:953): pid=1343 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:28.774195 kernel: audit: type=1104 audit(1696274188.767:954): pid=1343 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:28.775385 sshd[1339]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:28.775000 audit[1339]: USER_END pid=1339 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:28.780302 systemd[1]: sshd@6-139.178.70.108:22-86.109.11.97:40334.service: Deactivated successfully. Oct 2 19:16:28.780612 kernel: audit: type=1106 audit(1696274188.775:955): pid=1339 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:28.775000 audit[1339]: CRED_DISP pid=1339 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:28.780799 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:16:28.780888 systemd[1]: session-9.scope: Consumed 2.336s CPU time. Oct 2 19:16:28.781449 systemd-logind[1131]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:16:28.781970 systemd-logind[1131]: Removed session 9. Oct 2 19:16:28.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-86.109.11.97:40334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:28.786493 kernel: audit: type=1104 audit(1696274188.775:956): pid=1339 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:16:28.786539 kernel: audit: type=1131 audit(1696274188.779:957): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-86.109.11.97:40334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:38.382590 kubelet[2123]: I1002 19:16:38.382574 2123 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:16:38.383096 env[1138]: time="2023-10-02T19:16:38.383073435Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:16:38.383238 kubelet[2123]: I1002 19:16:38.383197 2123 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:16:39.217071 kubelet[2123]: I1002 19:16:39.217039 2123 topology_manager.go:215] "Topology Admit Handler" podUID="74c3cff8-af10-41a4-9dec-4ce820c87696" podNamespace="kube-system" podName="kube-proxy-9q86x" Oct 2 19:16:39.222169 systemd[1]: Created slice kubepods-besteffort-pod74c3cff8_af10_41a4_9dec_4ce820c87696.slice. Oct 2 19:16:39.240871 kubelet[2123]: I1002 19:16:39.240850 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/74c3cff8-af10-41a4-9dec-4ce820c87696-kube-proxy\") pod \"kube-proxy-9q86x\" (UID: \"74c3cff8-af10-41a4-9dec-4ce820c87696\") " pod="kube-system/kube-proxy-9q86x" Oct 2 19:16:39.240871 kubelet[2123]: I1002 19:16:39.240875 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74c3cff8-af10-41a4-9dec-4ce820c87696-xtables-lock\") pod \"kube-proxy-9q86x\" (UID: \"74c3cff8-af10-41a4-9dec-4ce820c87696\") " pod="kube-system/kube-proxy-9q86x" Oct 2 19:16:39.240986 kubelet[2123]: I1002 19:16:39.240887 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74c3cff8-af10-41a4-9dec-4ce820c87696-lib-modules\") pod \"kube-proxy-9q86x\" (UID: \"74c3cff8-af10-41a4-9dec-4ce820c87696\") " pod="kube-system/kube-proxy-9q86x" Oct 2 19:16:39.240986 kubelet[2123]: I1002 19:16:39.240898 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5mwgk\" (UniqueName: \"kubernetes.io/projected/74c3cff8-af10-41a4-9dec-4ce820c87696-kube-api-access-5mwgk\") pod \"kube-proxy-9q86x\" (UID: \"74c3cff8-af10-41a4-9dec-4ce820c87696\") " pod="kube-system/kube-proxy-9q86x" Oct 2 19:16:39.412759 kubelet[2123]: I1002 19:16:39.412737 2123 topology_manager.go:215] "Topology Admit Handler" podUID="129749e2-16c4-4f60-ae95-6a087261ed03" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-gbmwm" Oct 2 19:16:39.415805 systemd[1]: Created slice kubepods-besteffort-pod129749e2_16c4_4f60_ae95_6a087261ed03.slice. Oct 2 19:16:39.418736 kubelet[2123]: W1002 19:16:39.418715 2123 reflector.go:535] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object Oct 2 19:16:39.418820 kubelet[2123]: E1002 19:16:39.418744 2123 reflector.go:147] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object Oct 2 19:16:39.442618 kubelet[2123]: I1002 19:16:39.442590 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/129749e2-16c4-4f60-ae95-6a087261ed03-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-gbmwm\" (UID: \"129749e2-16c4-4f60-ae95-6a087261ed03\") " pod="tigera-operator/tigera-operator-8547bd6cc6-gbmwm" Oct 2 19:16:39.442729 kubelet[2123]: I1002 19:16:39.442632 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5zp7n\" (UniqueName: \"kubernetes.io/projected/129749e2-16c4-4f60-ae95-6a087261ed03-kube-api-access-5zp7n\") pod \"tigera-operator-8547bd6cc6-gbmwm\" (UID: \"129749e2-16c4-4f60-ae95-6a087261ed03\") " pod="tigera-operator/tigera-operator-8547bd6cc6-gbmwm" Oct 2 19:16:39.530685 env[1138]: time="2023-10-02T19:16:39.530599576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9q86x,Uid:74c3cff8-af10-41a4-9dec-4ce820c87696,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:39.541873 env[1138]: time="2023-10-02T19:16:39.541800585Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:39.542385 env[1138]: time="2023-10-02T19:16:39.541844232Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:39.542385 env[1138]: time="2023-10-02T19:16:39.541868194Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:39.542385 env[1138]: time="2023-10-02T19:16:39.542016753Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/573037d5768ecaeb85d95cafc97a0ed232aaf7ea6488e8060ff4035041a2d3f5 pid=2203 runtime=io.containerd.runc.v2 Oct 2 19:16:39.558326 systemd[1]: Started cri-containerd-573037d5768ecaeb85d95cafc97a0ed232aaf7ea6488e8060ff4035041a2d3f5.scope. Oct 2 19:16:39.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.575101 kernel: audit: type=1400 audit(1696274199.568:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.575141 kernel: audit: type=1400 audit(1696274199.568:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.575160 kernel: audit: type=1400 audit(1696274199.569:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.582989 kernel: audit: type=1400 audit(1696274199.569:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.583639 kernel: audit: type=1400 audit(1696274199.569:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.583665 kernel: audit: type=1400 audit(1696274199.569:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.585909 kernel: audit: type=1400 audit(1696274199.569:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.590730 kernel: audit: type=1400 audit(1696274199.569:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.593770 kernel: audit: type=1400 audit(1696274199.569:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.596294 kernel: audit: type=1400 audit(1696274199.569:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.569000 audit: BPF prog-id=112 op=LOAD Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2203 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333033376435373638656361656238356439356361666339376130 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2203 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333033376435373638656361656238356439356361666339376130 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.570000 audit: BPF prog-id=113 op=LOAD Oct 2 19:16:39.570000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000388340 items=0 ppid=2203 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333033376435373638656361656238356439356361666339376130 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.572000 audit: BPF prog-id=114 op=LOAD Oct 2 19:16:39.572000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000388388 items=0 ppid=2203 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333033376435373638656361656238356439356361666339376130 Oct 2 19:16:39.577000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:16:39.577000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.577000 audit: BPF prog-id=115 op=LOAD Oct 2 19:16:39.577000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000388798 items=0 ppid=2203 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333033376435373638656361656238356439356361666339376130 Oct 2 19:16:39.602662 env[1138]: time="2023-10-02T19:16:39.602633432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9q86x,Uid:74c3cff8-af10-41a4-9dec-4ce820c87696,Namespace:kube-system,Attempt:0,} returns sandbox id \"573037d5768ecaeb85d95cafc97a0ed232aaf7ea6488e8060ff4035041a2d3f5\"" Oct 2 19:16:39.604076 env[1138]: time="2023-10-02T19:16:39.603915072Z" level=info msg="CreateContainer within sandbox \"573037d5768ecaeb85d95cafc97a0ed232aaf7ea6488e8060ff4035041a2d3f5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:16:39.612310 env[1138]: time="2023-10-02T19:16:39.612283494Z" level=info msg="CreateContainer within sandbox \"573037d5768ecaeb85d95cafc97a0ed232aaf7ea6488e8060ff4035041a2d3f5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9dd0111bb03e30195cbf57d90a3d4421b4550553f87d64c49dc2e549d40b686b\"" Oct 2 19:16:39.613441 env[1138]: time="2023-10-02T19:16:39.613425589Z" level=info msg="StartContainer for \"9dd0111bb03e30195cbf57d90a3d4421b4550553f87d64c49dc2e549d40b686b\"" Oct 2 19:16:39.624036 systemd[1]: Started cri-containerd-9dd0111bb03e30195cbf57d90a3d4421b4550553f87d64c49dc2e549d40b686b.scope. Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2203 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964643031313162623033653330313935636266353764393061336434 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit: BPF prog-id=116 op=LOAD Oct 2 19:16:39.638000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d66e0 items=0 ppid=2203 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964643031313162623033653330313935636266353764393061336434 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.638000 audit: BPF prog-id=117 op=LOAD Oct 2 19:16:39.638000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003d6728 items=0 ppid=2203 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964643031313162623033653330313935636266353764393061336434 Oct 2 19:16:39.639000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:16:39.639000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.639000 audit: BPF prog-id=118 op=LOAD Oct 2 19:16:39.639000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003d67b8 items=0 ppid=2203 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964643031313162623033653330313935636266353764393061336434 Oct 2 19:16:39.649108 env[1138]: time="2023-10-02T19:16:39.649072158Z" level=info msg="StartContainer for \"9dd0111bb03e30195cbf57d90a3d4421b4550553f87d64c49dc2e549d40b686b\" returns successfully" Oct 2 19:16:39.717796 env[1138]: time="2023-10-02T19:16:39.717767469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-gbmwm,Uid:129749e2-16c4-4f60-ae95-6a087261ed03,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:16:39.725466 env[1138]: time="2023-10-02T19:16:39.725383603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:39.725466 env[1138]: time="2023-10-02T19:16:39.725420275Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:39.725466 env[1138]: time="2023-10-02T19:16:39.725428128Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:39.725921 env[1138]: time="2023-10-02T19:16:39.725849437Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02eeb9f9a3ff5c351fde2d687de8d9f7ea7d9c2886a5dd0e0db8a1487f583136 pid=2278 runtime=io.containerd.runc.v2 Oct 2 19:16:39.734549 systemd[1]: Started cri-containerd-02eeb9f9a3ff5c351fde2d687de8d9f7ea7d9c2886a5dd0e0db8a1487f583136.scope. Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.748000 audit: BPF prog-id=119 op=LOAD Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2278 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032656562396639613366663563333531666465326436383764653864 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2278 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032656562396639613366663563333531666465326436383764653864 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit: BPF prog-id=120 op=LOAD Oct 2 19:16:39.749000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028adb0 items=0 ppid=2278 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032656562396639613366663563333531666465326436383764653864 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit: BPF prog-id=121 op=LOAD Oct 2 19:16:39.749000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028adf8 items=0 ppid=2278 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032656562396639613366663563333531666465326436383764653864 Oct 2 19:16:39.749000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:16:39.749000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:39.749000 audit: BPF prog-id=122 op=LOAD Oct 2 19:16:39.749000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028b208 items=0 ppid=2278 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032656562396639613366663563333531666465326436383764653864 Oct 2 19:16:39.772093 env[1138]: time="2023-10-02T19:16:39.772068958Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-gbmwm,Uid:129749e2-16c4-4f60-ae95-6a087261ed03,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"02eeb9f9a3ff5c351fde2d687de8d9f7ea7d9c2886a5dd0e0db8a1487f583136\"" Oct 2 19:16:39.774293 env[1138]: time="2023-10-02T19:16:39.774254818Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:16:39.999000 audit[2339]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:39.999000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe240b4f60 a2=0 a3=7ffe240b4f4c items=0 ppid=2256 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:39.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:16:40.000000 audit[2340]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.000000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceb911520 a2=0 a3=7ffceb91150c items=0 ppid=2256 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:16:40.001000 audit[2342]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.001000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa097de60 a2=0 a3=7fffa097de4c items=0 ppid=2256 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:16:40.001000 audit[2341]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.001000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc3882040 a2=0 a3=7fffc388202c items=0 ppid=2256 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:16:40.002000 audit[2343]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.002000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff00a3f210 a2=0 a3=7fff00a3f1fc items=0 ppid=2256 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:16:40.003000 audit[2344]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.003000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe57ec3400 a2=0 a3=7ffe57ec33ec items=0 ppid=2256 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:16:40.106000 audit[2345]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.106000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0b0d0080 a2=0 a3=7ffd0b0d006c items=0 ppid=2256 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:16:40.109000 audit[2347]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.109000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe90906bb0 a2=0 a3=7ffe90906b9c items=0 ppid=2256 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:16:40.113000 audit[2350]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.113000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc88545f50 a2=0 a3=7ffc88545f3c items=0 ppid=2256 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:16:40.114000 audit[2351]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.114000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3d401e90 a2=0 a3=7ffc3d401e7c items=0 ppid=2256 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:16:40.116000 audit[2353]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.116000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc577a5dc0 a2=0 a3=7ffc577a5dac items=0 ppid=2256 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:16:40.117000 audit[2354]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.117000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebef7cf30 a2=0 a3=7ffebef7cf1c items=0 ppid=2256 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:16:40.119000 audit[2356]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.119000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc741a0b70 a2=0 a3=7ffc741a0b5c items=0 ppid=2256 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:16:40.122000 audit[2359]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.122000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdcd8831d0 a2=0 a3=7ffdcd8831bc items=0 ppid=2256 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:16:40.122000 audit[2360]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.122000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc422dc8e0 a2=0 a3=7ffc422dc8cc items=0 ppid=2256 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:16:40.124000 audit[2362]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.124000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd324a49d0 a2=0 a3=7ffd324a49bc items=0 ppid=2256 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:16:40.125000 audit[2363]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.125000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffce5eb9d0 a2=0 a3=7fffce5eb9bc items=0 ppid=2256 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:16:40.127000 audit[2365]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.127000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe30c90fb0 a2=0 a3=7ffe30c90f9c items=0 ppid=2256 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:16:40.130000 audit[2368]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.130000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4e48fd10 a2=0 a3=7ffe4e48fcfc items=0 ppid=2256 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:16:40.133000 audit[2371]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.133000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6bcb6530 a2=0 a3=7ffd6bcb651c items=0 ppid=2256 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:16:40.134000 audit[2372]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.134000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd12497110 a2=0 a3=7ffd124970fc items=0 ppid=2256 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:16:40.137000 audit[2374]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.137000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffdf2e0670 a2=0 a3=7fffdf2e065c items=0 ppid=2256 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:16:40.139000 audit[2377]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.139000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff7e28e60 a2=0 a3=7ffff7e28e4c items=0 ppid=2256 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:16:40.140000 audit[2378]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.140000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc5952930 a2=0 a3=7fffc595291c items=0 ppid=2256 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:16:40.142000 audit[2380]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:40.142000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd18eefe20 a2=0 a3=7ffd18eefe0c items=0 ppid=2256 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:16:40.166000 audit[2386]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:40.166000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc994f3b90 a2=0 a3=7ffc994f3b7c items=0 ppid=2256 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:40.176000 audit[2386]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:40.176000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc994f3b90 a2=0 a3=7ffc994f3b7c items=0 ppid=2256 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.176000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:40.179000 audit[2393]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:40.179000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcf68720d0 a2=0 a3=7ffcf68720bc items=0 ppid=2256 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:40.179000 audit[2393]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:40.179000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcf68720d0 a2=0 a3=31030 items=0 ppid=2256 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:40.183000 audit[2394]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.183000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff24ed2320 a2=0 a3=7fff24ed230c items=0 ppid=2256 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:16:40.185000 audit[2396]: NETFILTER_CFG table=filter:68 family=10 entries=2 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.185000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeeb445100 a2=0 a3=7ffeeb4450ec items=0 ppid=2256 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:16:40.189000 audit[2399]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.189000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdc2624bb0 a2=0 a3=7ffdc2624b9c items=0 ppid=2256 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:16:40.189000 audit[2400]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.189000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd30486010 a2=0 a3=7ffd30485ffc items=0 ppid=2256 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:16:40.191000 audit[2402]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.191000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe46d00890 a2=0 a3=7ffe46d0087c items=0 ppid=2256 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:16:40.192000 audit[2403]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.192000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9f8dca90 a2=0 a3=7fff9f8dca7c items=0 ppid=2256 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:16:40.194000 audit[2405]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.194000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcae8b7fd0 a2=0 a3=7ffcae8b7fbc items=0 ppid=2256 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:16:40.196000 audit[2408]: NETFILTER_CFG table=filter:74 family=10 entries=2 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.196000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd8d60ad30 a2=0 a3=7ffd8d60ad1c items=0 ppid=2256 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:16:40.196000 audit[2409]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.196000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff51e07b10 a2=0 a3=7fff51e07afc items=0 ppid=2256 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:16:40.199000 audit[2411]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.199000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff80f8fe20 a2=0 a3=7fff80f8fe0c items=0 ppid=2256 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:16:40.200000 audit[2412]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.200000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc775b1fc0 a2=0 a3=7ffc775b1fac items=0 ppid=2256 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:16:40.202000 audit[2414]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.202000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcec667bd0 a2=0 a3=7ffcec667bbc items=0 ppid=2256 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:16:40.204000 audit[2417]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.204000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffddfffc970 a2=0 a3=7ffddfffc95c items=0 ppid=2256 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:16:40.206000 audit[2420]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.206000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccb107960 a2=0 a3=7ffccb10794c items=0 ppid=2256 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:16:40.207000 audit[2421]: NETFILTER_CFG table=nat:81 family=10 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.207000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc4130a400 a2=0 a3=7ffc4130a3ec items=0 ppid=2256 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:16:40.208000 audit[2423]: NETFILTER_CFG table=nat:82 family=10 entries=2 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.208000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff44c5e970 a2=0 a3=7fff44c5e95c items=0 ppid=2256 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:16:40.210000 audit[2426]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.210000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff0d9f07a0 a2=0 a3=7fff0d9f078c items=0 ppid=2256 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:16:40.211000 audit[2427]: NETFILTER_CFG table=nat:84 family=10 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.211000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaba51d80 a2=0 a3=7ffcaba51d6c items=0 ppid=2256 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:16:40.212000 audit[2429]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.212000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff8b24f3c0 a2=0 a3=7fff8b24f3ac items=0 ppid=2256 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:16:40.213000 audit[2430]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.213000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe525ab840 a2=0 a3=7ffe525ab82c items=0 ppid=2256 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:16:40.214000 audit[2432]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.214000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4146d470 a2=0 a3=7fff4146d45c items=0 ppid=2256 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:16:40.216000 audit[2435]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:40.216000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe96b649b0 a2=0 a3=7ffe96b6499c items=0 ppid=2256 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:16:40.218000 audit[2437]: NETFILTER_CFG table=filter:89 family=10 entries=3 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:16:40.218000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffef076590 a2=0 a3=7fffef07657c items=0 ppid=2256 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.218000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:40.219000 audit[2437]: NETFILTER_CFG table=nat:90 family=10 entries=7 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:16:40.219000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fffef076590 a2=0 a3=7fffef07657c items=0 ppid=2256 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:40.219000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:40.359393 systemd[1]: run-containerd-runc-k8s.io-573037d5768ecaeb85d95cafc97a0ed232aaf7ea6488e8060ff4035041a2d3f5-runc.y6iH9U.mount: Deactivated successfully. Oct 2 19:16:40.751391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3860321194.mount: Deactivated successfully. Oct 2 19:16:41.636698 env[1138]: time="2023-10-02T19:16:41.636669254Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:41.637492 env[1138]: time="2023-10-02T19:16:41.637478290Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:41.638377 env[1138]: time="2023-10-02T19:16:41.638365371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:41.639234 env[1138]: time="2023-10-02T19:16:41.639217280Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:41.639877 env[1138]: time="2023-10-02T19:16:41.639864184Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:16:41.641446 env[1138]: time="2023-10-02T19:16:41.641423129Z" level=info msg="CreateContainer within sandbox \"02eeb9f9a3ff5c351fde2d687de8d9f7ea7d9c2886a5dd0e0db8a1487f583136\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:16:41.647390 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4184979466.mount: Deactivated successfully. Oct 2 19:16:41.650209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1398257192.mount: Deactivated successfully. Oct 2 19:16:41.660006 env[1138]: time="2023-10-02T19:16:41.659982659Z" level=info msg="CreateContainer within sandbox \"02eeb9f9a3ff5c351fde2d687de8d9f7ea7d9c2886a5dd0e0db8a1487f583136\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"45149e99403240cd09bccb5900a17328cb2150546672932414f91aeba2cc07d6\"" Oct 2 19:16:41.661238 env[1138]: time="2023-10-02T19:16:41.660444772Z" level=info msg="StartContainer for \"45149e99403240cd09bccb5900a17328cb2150546672932414f91aeba2cc07d6\"" Oct 2 19:16:41.674506 systemd[1]: Started cri-containerd-45149e99403240cd09bccb5900a17328cb2150546672932414f91aeba2cc07d6.scope. Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit: BPF prog-id=123 op=LOAD Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2278 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313439653939343033323430636430396263636235393030613137 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2278 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313439653939343033323430636430396263636235393030613137 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit: BPF prog-id=124 op=LOAD Oct 2 19:16:41.681000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000277be0 items=0 ppid=2278 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313439653939343033323430636430396263636235393030613137 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit: BPF prog-id=125 op=LOAD Oct 2 19:16:41.681000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000277c28 items=0 ppid=2278 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313439653939343033323430636430396263636235393030613137 Oct 2 19:16:41.681000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:16:41.681000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.681000 audit: BPF prog-id=126 op=LOAD Oct 2 19:16:41.681000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c0038 items=0 ppid=2278 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313439653939343033323430636430396263636235393030613137 Oct 2 19:16:41.690870 env[1138]: time="2023-10-02T19:16:41.690830750Z" level=info msg="StartContainer for \"45149e99403240cd09bccb5900a17328cb2150546672932414f91aeba2cc07d6\" returns successfully" Oct 2 19:16:42.609636 kubelet[2123]: I1002 19:16:42.609615 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9q86x" podStartSLOduration=3.60959123 podCreationTimestamp="2023-10-02 19:16:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:40.611910809 +0000 UTC m=+16.128284481" watchObservedRunningTime="2023-10-02 19:16:42.60959123 +0000 UTC m=+18.125964893" Oct 2 19:16:42.610014 kubelet[2123]: I1002 19:16:42.610003 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-gbmwm" podStartSLOduration=1.742617029 podCreationTimestamp="2023-10-02 19:16:39 +0000 UTC" firstStartedPulling="2023-10-02 19:16:39.77283966 +0000 UTC m=+15.289213323" lastFinishedPulling="2023-10-02 19:16:41.640203468 +0000 UTC m=+17.156577130" observedRunningTime="2023-10-02 19:16:42.609462811 +0000 UTC m=+18.125836481" watchObservedRunningTime="2023-10-02 19:16:42.609980836 +0000 UTC m=+18.126354526" Oct 2 19:16:43.399000 audit[2476]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:43.399000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fffdef62120 a2=0 a3=7fffdef6210c items=0 ppid=2256 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:43.399000 audit[2476]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:43.399000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fffdef62120 a2=0 a3=31030 items=0 ppid=2256 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:43.406000 audit[2478]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:43.406000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe83171240 a2=0 a3=7ffe8317122c items=0 ppid=2256 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.406000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:43.408000 audit[2478]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:43.408000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe83171240 a2=0 a3=31030 items=0 ppid=2256 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:43.616178 kubelet[2123]: I1002 19:16:43.616155 2123 topology_manager.go:215] "Topology Admit Handler" podUID="2db7d3a2-1d6b-452f-8467-442201f6663a" podNamespace="calico-system" podName="calico-typha-7b5f587764-w4ztf" Oct 2 19:16:43.619104 systemd[1]: Created slice kubepods-besteffort-pod2db7d3a2_1d6b_452f_8467_442201f6663a.slice. Oct 2 19:16:43.651352 kubelet[2123]: I1002 19:16:43.651279 2123 topology_manager.go:215] "Topology Admit Handler" podUID="67d92236-1d99-4917-b2c8-82014ea61c5c" podNamespace="calico-system" podName="calico-node-w94cw" Oct 2 19:16:43.654625 systemd[1]: Created slice kubepods-besteffort-pod67d92236_1d99_4917_b2c8_82014ea61c5c.slice. Oct 2 19:16:43.668230 kubelet[2123]: I1002 19:16:43.668209 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-xtables-lock\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668230 kubelet[2123]: I1002 19:16:43.668235 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-lib-modules\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668356 kubelet[2123]: I1002 19:16:43.668258 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2db7d3a2-1d6b-452f-8467-442201f6663a-typha-certs\") pod \"calico-typha-7b5f587764-w4ztf\" (UID: \"2db7d3a2-1d6b-452f-8467-442201f6663a\") " pod="calico-system/calico-typha-7b5f587764-w4ztf" Oct 2 19:16:43.668356 kubelet[2123]: I1002 19:16:43.668271 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-policysync\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668356 kubelet[2123]: I1002 19:16:43.668285 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67d92236-1d99-4917-b2c8-82014ea61c5c-tigera-ca-bundle\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668356 kubelet[2123]: I1002 19:16:43.668296 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/67d92236-1d99-4917-b2c8-82014ea61c5c-node-certs\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668356 kubelet[2123]: I1002 19:16:43.668306 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-var-lib-calico\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668450 kubelet[2123]: I1002 19:16:43.668319 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-75gds\" (UniqueName: \"kubernetes.io/projected/2db7d3a2-1d6b-452f-8467-442201f6663a-kube-api-access-75gds\") pod \"calico-typha-7b5f587764-w4ztf\" (UID: \"2db7d3a2-1d6b-452f-8467-442201f6663a\") " pod="calico-system/calico-typha-7b5f587764-w4ztf" Oct 2 19:16:43.668450 kubelet[2123]: I1002 19:16:43.668331 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-flexvol-driver-host\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668450 kubelet[2123]: I1002 19:16:43.668342 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-var-run-calico\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668450 kubelet[2123]: I1002 19:16:43.668353 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2db7d3a2-1d6b-452f-8467-442201f6663a-tigera-ca-bundle\") pod \"calico-typha-7b5f587764-w4ztf\" (UID: \"2db7d3a2-1d6b-452f-8467-442201f6663a\") " pod="calico-system/calico-typha-7b5f587764-w4ztf" Oct 2 19:16:43.668450 kubelet[2123]: I1002 19:16:43.668363 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-cni-bin-dir\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668552 kubelet[2123]: I1002 19:16:43.668379 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-cni-net-dir\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668552 kubelet[2123]: I1002 19:16:43.668390 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/67d92236-1d99-4917-b2c8-82014ea61c5c-cni-log-dir\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.668552 kubelet[2123]: I1002 19:16:43.668402 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ln5cv\" (UniqueName: \"kubernetes.io/projected/67d92236-1d99-4917-b2c8-82014ea61c5c-kube-api-access-ln5cv\") pod \"calico-node-w94cw\" (UID: \"67d92236-1d99-4917-b2c8-82014ea61c5c\") " pod="calico-system/calico-node-w94cw" Oct 2 19:16:43.778044 kubelet[2123]: E1002 19:16:43.778028 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:43.778131 kubelet[2123]: W1002 19:16:43.778050 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:43.778131 kubelet[2123]: E1002 19:16:43.778069 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:43.778196 kubelet[2123]: E1002 19:16:43.778187 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:43.778196 kubelet[2123]: W1002 19:16:43.778193 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:43.778303 kubelet[2123]: E1002 19:16:43.778201 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:43.778472 kubelet[2123]: E1002 19:16:43.778455 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:43.778472 kubelet[2123]: W1002 19:16:43.778462 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:43.778472 kubelet[2123]: E1002 19:16:43.778469 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:43.790160 kubelet[2123]: E1002 19:16:43.790128 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:43.790160 kubelet[2123]: W1002 19:16:43.790140 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:43.790160 kubelet[2123]: E1002 19:16:43.790154 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:43.796673 kubelet[2123]: E1002 19:16:43.796217 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:43.796673 kubelet[2123]: W1002 19:16:43.796228 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:43.796673 kubelet[2123]: E1002 19:16:43.796241 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:43.922036 env[1138]: time="2023-10-02T19:16:43.921967469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b5f587764-w4ztf,Uid:2db7d3a2-1d6b-452f-8467-442201f6663a,Namespace:calico-system,Attempt:0,}" Oct 2 19:16:43.931628 env[1138]: time="2023-10-02T19:16:43.931575252Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:43.931628 env[1138]: time="2023-10-02T19:16:43.931604689Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:43.931628 env[1138]: time="2023-10-02T19:16:43.931612370Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:43.931874 env[1138]: time="2023-10-02T19:16:43.931845633Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/31b2fa91a307f7dc98421fd711afdf4eead2cb1137ea986590544ae0fbf4ab49 pid=2496 runtime=io.containerd.runc.v2 Oct 2 19:16:43.940276 systemd[1]: Started cri-containerd-31b2fa91a307f7dc98421fd711afdf4eead2cb1137ea986590544ae0fbf4ab49.scope. Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit: BPF prog-id=127 op=LOAD Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2496 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331623266613931613330376637646339383432316664373131616664 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2496 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331623266613931613330376637646339383432316664373131616664 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit: BPF prog-id=128 op=LOAD Oct 2 19:16:43.952000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00030c340 items=0 ppid=2496 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331623266613931613330376637646339383432316664373131616664 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit: BPF prog-id=129 op=LOAD Oct 2 19:16:43.952000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00030c388 items=0 ppid=2496 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331623266613931613330376637646339383432316664373131616664 Oct 2 19:16:43.952000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:16:43.952000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.952000 audit: BPF prog-id=130 op=LOAD Oct 2 19:16:43.952000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00030c798 items=0 ppid=2496 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331623266613931613330376637646339383432316664373131616664 Oct 2 19:16:43.957124 env[1138]: time="2023-10-02T19:16:43.957099109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-w94cw,Uid:67d92236-1d99-4917-b2c8-82014ea61c5c,Namespace:calico-system,Attempt:0,}" Oct 2 19:16:43.966320 env[1138]: time="2023-10-02T19:16:43.966229807Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:43.966320 env[1138]: time="2023-10-02T19:16:43.966248662Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:43.966320 env[1138]: time="2023-10-02T19:16:43.966255088Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:43.966677 env[1138]: time="2023-10-02T19:16:43.966528196Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712 pid=2528 runtime=io.containerd.runc.v2 Oct 2 19:16:43.974778 systemd[1]: Started cri-containerd-dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712.scope. Oct 2 19:16:43.995373 env[1138]: time="2023-10-02T19:16:43.995343730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b5f587764-w4ztf,Uid:2db7d3a2-1d6b-452f-8467-442201f6663a,Namespace:calico-system,Attempt:0,} returns sandbox id \"31b2fa91a307f7dc98421fd711afdf4eead2cb1137ea986590544ae0fbf4ab49\"" Oct 2 19:16:43.996203 env[1138]: time="2023-10-02T19:16:43.996187406Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit: BPF prog-id=131 op=LOAD Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2528 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:44.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393838343634656466666131383437653233396666383935656261 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2528 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:44.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393838343634656466666131383437653233396666383935656261 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit: BPF prog-id=132 op=LOAD Oct 2 19:16:44.005000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020cc30 items=0 ppid=2528 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:44.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393838343634656466666131383437653233396666383935656261 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit: BPF prog-id=133 op=LOAD Oct 2 19:16:44.005000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020cc78 items=0 ppid=2528 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:44.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393838343634656466666131383437653233396666383935656261 Oct 2 19:16:44.005000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:16:44.005000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:44.005000 audit: BPF prog-id=134 op=LOAD Oct 2 19:16:44.005000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020d088 items=0 ppid=2528 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:44.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393838343634656466666131383437653233396666383935656261 Oct 2 19:16:44.017043 env[1138]: time="2023-10-02T19:16:44.017015596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-w94cw,Uid:67d92236-1d99-4917-b2c8-82014ea61c5c,Namespace:calico-system,Attempt:0,} returns sandbox id \"dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712\"" Oct 2 19:16:44.418000 audit[2570]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:44.418000 audit[2570]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcf738c970 a2=0 a3=7ffcf738c95c items=0 ppid=2256 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:44.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:44.418000 audit[2570]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:44.418000 audit[2570]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcf738c970 a2=0 a3=31030 items=0 ppid=2256 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:44.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:45.424813 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3240344732.mount: Deactivated successfully. Oct 2 19:16:46.566769 env[1138]: time="2023-10-02T19:16:46.566738087Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:46.569908 env[1138]: time="2023-10-02T19:16:46.569890492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:46.571009 env[1138]: time="2023-10-02T19:16:46.570993979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:46.572446 env[1138]: time="2023-10-02T19:16:46.572430991Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:16:46.572976 env[1138]: time="2023-10-02T19:16:46.572932600Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:46.573451 env[1138]: time="2023-10-02T19:16:46.573210900Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:16:46.574552 env[1138]: time="2023-10-02T19:16:46.574531068Z" level=info msg="CreateContainer within sandbox \"31b2fa91a307f7dc98421fd711afdf4eead2cb1137ea986590544ae0fbf4ab49\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:16:46.584534 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1577048792.mount: Deactivated successfully. Oct 2 19:16:46.588937 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount812840080.mount: Deactivated successfully. Oct 2 19:16:46.591669 env[1138]: time="2023-10-02T19:16:46.591648124Z" level=info msg="CreateContainer within sandbox \"31b2fa91a307f7dc98421fd711afdf4eead2cb1137ea986590544ae0fbf4ab49\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8d896426fa2a51f968d7cc10d27fa74d0dd398bf3b89f7a67918359b20c7abef\"" Oct 2 19:16:46.601908 env[1138]: time="2023-10-02T19:16:46.601891181Z" level=info msg="StartContainer for \"8d896426fa2a51f968d7cc10d27fa74d0dd398bf3b89f7a67918359b20c7abef\"" Oct 2 19:16:46.615305 systemd[1]: Started cri-containerd-8d896426fa2a51f968d7cc10d27fa74d0dd398bf3b89f7a67918359b20c7abef.scope. Oct 2 19:16:46.646608 kernel: kauditd_printk_skb: 495 callbacks suppressed Oct 2 19:16:46.646684 kernel: audit: type=1400 audit(1696274206.641:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.646703 kernel: audit: type=1400 audit(1696274206.641:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.650676 kernel: audit: type=1400 audit(1696274206.641:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.653145 kernel: audit: type=1400 audit(1696274206.641:1116): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.653174 kernel: audit: type=1400 audit(1696274206.641:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.660533 kernel: audit: type=1400 audit(1696274206.641:1118): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.660571 kernel: audit: type=1400 audit(1696274206.641:1119): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.663596 kernel: audit: type=1400 audit(1696274206.641:1120): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.668792 kernel: audit: type=1400 audit(1696274206.641:1121): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.668859 kernel: audit: type=1400 audit(1696274206.642:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.642000 audit: BPF prog-id=135 op=LOAD Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2496 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:46.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864383936343236666132613531663936386437636331306432376661 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2496 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:46.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864383936343236666132613531663936386437636331306432376661 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.645000 audit: BPF prog-id=136 op=LOAD Oct 2 19:16:46.645000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028ae90 items=0 ppid=2496 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:46.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864383936343236666132613531663936386437636331306432376661 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.647000 audit: BPF prog-id=137 op=LOAD Oct 2 19:16:46.647000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028aed8 items=0 ppid=2496 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:46.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864383936343236666132613531663936386437636331306432376661 Oct 2 19:16:46.655000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:16:46.655000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:46.655000 audit: BPF prog-id=138 op=LOAD Oct 2 19:16:46.655000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b2e8 items=0 ppid=2496 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:46.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864383936343236666132613531663936386437636331306432376661 Oct 2 19:16:46.687872 env[1138]: time="2023-10-02T19:16:46.687839850Z" level=info msg="StartContainer for \"8d896426fa2a51f968d7cc10d27fa74d0dd398bf3b89f7a67918359b20c7abef\" returns successfully" Oct 2 19:16:47.622147 kubelet[2123]: I1002 19:16:47.622017 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7b5f587764-w4ztf" podStartSLOduration=2.044869009 podCreationTimestamp="2023-10-02 19:16:43 +0000 UTC" firstStartedPulling="2023-10-02 19:16:43.996024867 +0000 UTC m=+19.512398529" lastFinishedPulling="2023-10-02 19:16:46.573145212 +0000 UTC m=+22.089518876" observedRunningTime="2023-10-02 19:16:47.621988344 +0000 UTC m=+23.138362025" watchObservedRunningTime="2023-10-02 19:16:47.621989356 +0000 UTC m=+23.138363029" Oct 2 19:16:47.653000 audit[2612]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:47.653000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd505f4370 a2=0 a3=7ffd505f435c items=0 ppid=2256 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:47.654000 audit[2612]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:47.654000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd505f4370 a2=0 a3=7ffd505f435c items=0 ppid=2256 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:47.681436 kubelet[2123]: E1002 19:16:47.681359 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.681436 kubelet[2123]: W1002 19:16:47.681373 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.681436 kubelet[2123]: E1002 19:16:47.681388 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.681675 kubelet[2123]: E1002 19:16:47.681613 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.681675 kubelet[2123]: W1002 19:16:47.681620 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.681675 kubelet[2123]: E1002 19:16:47.681627 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.681836 kubelet[2123]: E1002 19:16:47.681778 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.681836 kubelet[2123]: W1002 19:16:47.681784 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.681836 kubelet[2123]: E1002 19:16:47.681791 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.681990 kubelet[2123]: E1002 19:16:47.681932 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.681990 kubelet[2123]: W1002 19:16:47.681938 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.681990 kubelet[2123]: E1002 19:16:47.681945 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.682136 kubelet[2123]: E1002 19:16:47.682088 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.682136 kubelet[2123]: W1002 19:16:47.682094 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.682136 kubelet[2123]: E1002 19:16:47.682100 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.682295 kubelet[2123]: E1002 19:16:47.682244 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.682295 kubelet[2123]: W1002 19:16:47.682250 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.682295 kubelet[2123]: E1002 19:16:47.682257 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.682561 kubelet[2123]: E1002 19:16:47.682392 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.682561 kubelet[2123]: W1002 19:16:47.682397 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.682561 kubelet[2123]: E1002 19:16:47.682404 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.682561 kubelet[2123]: E1002 19:16:47.682490 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.682561 kubelet[2123]: W1002 19:16:47.682496 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.682561 kubelet[2123]: E1002 19:16:47.682502 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.682766 kubelet[2123]: E1002 19:16:47.682715 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.682766 kubelet[2123]: W1002 19:16:47.682721 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.682766 kubelet[2123]: E1002 19:16:47.682728 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.682921 kubelet[2123]: E1002 19:16:47.682863 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.682921 kubelet[2123]: W1002 19:16:47.682870 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.682921 kubelet[2123]: E1002 19:16:47.682876 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.683071 kubelet[2123]: E1002 19:16:47.683019 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.683071 kubelet[2123]: W1002 19:16:47.683025 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.683071 kubelet[2123]: E1002 19:16:47.683032 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.683227 kubelet[2123]: E1002 19:16:47.683171 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.683227 kubelet[2123]: W1002 19:16:47.683176 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.683227 kubelet[2123]: E1002 19:16:47.683183 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.683409 kubelet[2123]: E1002 19:16:47.683357 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.683409 kubelet[2123]: W1002 19:16:47.683363 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.683409 kubelet[2123]: E1002 19:16:47.683369 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.683645 kubelet[2123]: E1002 19:16:47.683502 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.683645 kubelet[2123]: W1002 19:16:47.683508 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.683645 kubelet[2123]: E1002 19:16:47.683514 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.683645 kubelet[2123]: E1002 19:16:47.683609 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.683645 kubelet[2123]: W1002 19:16:47.683613 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.683645 kubelet[2123]: E1002 19:16:47.683620 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.692892 kubelet[2123]: E1002 19:16:47.692869 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.692892 kubelet[2123]: W1002 19:16:47.692884 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.692892 kubelet[2123]: E1002 19:16:47.692898 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.693060 kubelet[2123]: E1002 19:16:47.693034 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.693060 kubelet[2123]: W1002 19:16:47.693039 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.693060 kubelet[2123]: E1002 19:16:47.693048 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.693150 kubelet[2123]: E1002 19:16:47.693137 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.693150 kubelet[2123]: W1002 19:16:47.693151 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.693207 kubelet[2123]: E1002 19:16:47.693158 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.693275 kubelet[2123]: E1002 19:16:47.693264 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.693275 kubelet[2123]: W1002 19:16:47.693273 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.693322 kubelet[2123]: E1002 19:16:47.693284 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.693375 kubelet[2123]: E1002 19:16:47.693365 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.693418 kubelet[2123]: W1002 19:16:47.693380 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.693418 kubelet[2123]: E1002 19:16:47.693391 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.693482 kubelet[2123]: E1002 19:16:47.693471 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.693520 kubelet[2123]: W1002 19:16:47.693485 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.693520 kubelet[2123]: E1002 19:16:47.693493 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.693612 kubelet[2123]: E1002 19:16:47.693602 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.693612 kubelet[2123]: W1002 19:16:47.693608 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.693670 kubelet[2123]: E1002 19:16:47.693617 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.693847 kubelet[2123]: E1002 19:16:47.693822 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.693847 kubelet[2123]: W1002 19:16:47.693829 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.693847 kubelet[2123]: E1002 19:16:47.693839 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.693958 kubelet[2123]: E1002 19:16:47.693949 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.693958 kubelet[2123]: W1002 19:16:47.693956 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.694044 kubelet[2123]: E1002 19:16:47.693974 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.694068 kubelet[2123]: E1002 19:16:47.694063 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.694068 kubelet[2123]: W1002 19:16:47.694067 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.694110 kubelet[2123]: E1002 19:16:47.694075 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.694185 kubelet[2123]: E1002 19:16:47.694175 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.694185 kubelet[2123]: W1002 19:16:47.694182 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.694244 kubelet[2123]: E1002 19:16:47.694204 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.694321 kubelet[2123]: E1002 19:16:47.694311 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.694321 kubelet[2123]: W1002 19:16:47.694320 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.694374 kubelet[2123]: E1002 19:16:47.694347 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.694518 kubelet[2123]: E1002 19:16:47.694506 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.694518 kubelet[2123]: W1002 19:16:47.694514 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.694585 kubelet[2123]: E1002 19:16:47.694522 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.694646 kubelet[2123]: E1002 19:16:47.694633 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.694646 kubelet[2123]: W1002 19:16:47.694642 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.694698 kubelet[2123]: E1002 19:16:47.694651 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.694747 kubelet[2123]: E1002 19:16:47.694735 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.694747 kubelet[2123]: W1002 19:16:47.694743 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.694810 kubelet[2123]: E1002 19:16:47.694751 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.694874 kubelet[2123]: E1002 19:16:47.694862 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.694874 kubelet[2123]: W1002 19:16:47.694869 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.694931 kubelet[2123]: E1002 19:16:47.694878 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.695076 kubelet[2123]: E1002 19:16:47.695045 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.695076 kubelet[2123]: W1002 19:16:47.695052 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.695076 kubelet[2123]: E1002 19:16:47.695062 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:47.695179 kubelet[2123]: E1002 19:16:47.695166 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:47.695179 kubelet[2123]: W1002 19:16:47.695175 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:47.695232 kubelet[2123]: E1002 19:16:47.695182 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.690149 kubelet[2123]: E1002 19:16:48.690071 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.690149 kubelet[2123]: W1002 19:16:48.690087 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.690149 kubelet[2123]: E1002 19:16:48.690103 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.690592 kubelet[2123]: E1002 19:16:48.690504 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.690592 kubelet[2123]: W1002 19:16:48.690512 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.690592 kubelet[2123]: E1002 19:16:48.690522 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.690797 kubelet[2123]: E1002 19:16:48.690721 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.690797 kubelet[2123]: W1002 19:16:48.690730 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.690797 kubelet[2123]: E1002 19:16:48.690742 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.690974 kubelet[2123]: E1002 19:16:48.690907 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.690974 kubelet[2123]: W1002 19:16:48.690912 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.690974 kubelet[2123]: E1002 19:16:48.690919 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.691156 kubelet[2123]: E1002 19:16:48.691098 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.691156 kubelet[2123]: W1002 19:16:48.691106 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.691156 kubelet[2123]: E1002 19:16:48.691116 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.691354 kubelet[2123]: E1002 19:16:48.691291 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.691354 kubelet[2123]: W1002 19:16:48.691297 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.691354 kubelet[2123]: E1002 19:16:48.691303 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.691508 kubelet[2123]: E1002 19:16:48.691454 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.691508 kubelet[2123]: W1002 19:16:48.691460 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.691508 kubelet[2123]: E1002 19:16:48.691466 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.691664 kubelet[2123]: E1002 19:16:48.691611 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.691664 kubelet[2123]: W1002 19:16:48.691616 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.691664 kubelet[2123]: E1002 19:16:48.691623 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.691825 kubelet[2123]: E1002 19:16:48.691772 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.691825 kubelet[2123]: W1002 19:16:48.691778 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.691825 kubelet[2123]: E1002 19:16:48.691784 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.692028 kubelet[2123]: E1002 19:16:48.691963 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.692028 kubelet[2123]: W1002 19:16:48.691970 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.692028 kubelet[2123]: E1002 19:16:48.691980 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.692146 kubelet[2123]: E1002 19:16:48.692141 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.692214 kubelet[2123]: W1002 19:16:48.692205 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.692317 kubelet[2123]: E1002 19:16:48.692260 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.692404 kubelet[2123]: E1002 19:16:48.692397 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.692465 kubelet[2123]: W1002 19:16:48.692456 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.692527 kubelet[2123]: E1002 19:16:48.692518 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.692713 kubelet[2123]: E1002 19:16:48.692704 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.692777 kubelet[2123]: W1002 19:16:48.692767 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.692826 kubelet[2123]: E1002 19:16:48.692818 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.692975 kubelet[2123]: E1002 19:16:48.692969 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.693028 kubelet[2123]: W1002 19:16:48.693020 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.693087 kubelet[2123]: E1002 19:16:48.693078 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.693233 kubelet[2123]: E1002 19:16:48.693227 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.693279 kubelet[2123]: W1002 19:16:48.693272 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.693332 kubelet[2123]: E1002 19:16:48.693324 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.698388 kubelet[2123]: E1002 19:16:48.698380 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.698449 kubelet[2123]: W1002 19:16:48.698438 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.698516 kubelet[2123]: E1002 19:16:48.698507 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.698728 kubelet[2123]: E1002 19:16:48.698719 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.698783 kubelet[2123]: W1002 19:16:48.698774 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.698840 kubelet[2123]: E1002 19:16:48.698832 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.698988 kubelet[2123]: E1002 19:16:48.698973 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.699048 kubelet[2123]: W1002 19:16:48.699038 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.699101 kubelet[2123]: E1002 19:16:48.699092 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.699252 kubelet[2123]: E1002 19:16:48.699245 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.699314 kubelet[2123]: W1002 19:16:48.699304 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.699374 kubelet[2123]: E1002 19:16:48.699367 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.699517 kubelet[2123]: E1002 19:16:48.699510 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.699586 kubelet[2123]: W1002 19:16:48.699576 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.699648 kubelet[2123]: E1002 19:16:48.699640 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.699778 kubelet[2123]: E1002 19:16:48.699772 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.699831 kubelet[2123]: W1002 19:16:48.699822 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.699910 kubelet[2123]: E1002 19:16:48.699897 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.700028 kubelet[2123]: E1002 19:16:48.700022 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.700078 kubelet[2123]: W1002 19:16:48.700068 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.700149 kubelet[2123]: E1002 19:16:48.700139 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.700277 kubelet[2123]: E1002 19:16:48.700271 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.700325 kubelet[2123]: W1002 19:16:48.700315 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.700376 kubelet[2123]: E1002 19:16:48.700367 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.700520 kubelet[2123]: E1002 19:16:48.700514 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.700580 kubelet[2123]: W1002 19:16:48.700572 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.700630 kubelet[2123]: E1002 19:16:48.700623 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.700755 kubelet[2123]: E1002 19:16:48.700750 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.700800 kubelet[2123]: W1002 19:16:48.700792 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.700850 kubelet[2123]: E1002 19:16:48.700843 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.701005 kubelet[2123]: E1002 19:16:48.700997 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.701058 kubelet[2123]: W1002 19:16:48.701048 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.701131 kubelet[2123]: E1002 19:16:48.701122 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.701272 kubelet[2123]: E1002 19:16:48.701260 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.701272 kubelet[2123]: W1002 19:16:48.701267 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.701347 kubelet[2123]: E1002 19:16:48.701275 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.701510 kubelet[2123]: E1002 19:16:48.701502 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.701581 kubelet[2123]: W1002 19:16:48.701571 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.701653 kubelet[2123]: E1002 19:16:48.701644 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.701802 kubelet[2123]: E1002 19:16:48.701793 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.701802 kubelet[2123]: W1002 19:16:48.701799 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.701889 kubelet[2123]: E1002 19:16:48.701808 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.701922 kubelet[2123]: E1002 19:16:48.701897 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.701922 kubelet[2123]: W1002 19:16:48.701901 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.701922 kubelet[2123]: E1002 19:16:48.701907 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.702017 kubelet[2123]: E1002 19:16:48.701970 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.702017 kubelet[2123]: W1002 19:16:48.701974 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.702017 kubelet[2123]: E1002 19:16:48.701979 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.702111 kubelet[2123]: E1002 19:16:48.702050 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.702111 kubelet[2123]: W1002 19:16:48.702054 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.702111 kubelet[2123]: E1002 19:16:48.702059 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:48.702189 kubelet[2123]: E1002 19:16:48.702178 2123 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:48.702189 kubelet[2123]: W1002 19:16:48.702182 2123 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:48.702189 kubelet[2123]: E1002 19:16:48.702188 2123 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:49.095767 env[1138]: time="2023-10-02T19:16:49.095733708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:49.097003 env[1138]: time="2023-10-02T19:16:49.096979798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:49.098361 env[1138]: time="2023-10-02T19:16:49.098339506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:49.099659 env[1138]: time="2023-10-02T19:16:49.099639394Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:49.100185 env[1138]: time="2023-10-02T19:16:49.100162269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:16:49.103239 env[1138]: time="2023-10-02T19:16:49.103213235Z" level=info msg="CreateContainer within sandbox \"dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:16:49.108663 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1674588818.mount: Deactivated successfully. Oct 2 19:16:49.111761 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2451833334.mount: Deactivated successfully. Oct 2 19:16:49.123091 env[1138]: time="2023-10-02T19:16:49.123061390Z" level=info msg="CreateContainer within sandbox \"dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"186315e014bf755be9e74fdfef22d8d756a248306054e6427e38c0144e9e9f4c\"" Oct 2 19:16:49.124497 env[1138]: time="2023-10-02T19:16:49.123381679Z" level=info msg="StartContainer for \"186315e014bf755be9e74fdfef22d8d756a248306054e6427e38c0144e9e9f4c\"" Oct 2 19:16:49.141512 systemd[1]: Started cri-containerd-186315e014bf755be9e74fdfef22d8d756a248306054e6427e38c0144e9e9f4c.scope. Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2528 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363331356530313462663735356265396537346664666566323264 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit: BPF prog-id=139 op=LOAD Oct 2 19:16:49.159000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030e1f0 items=0 ppid=2528 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363331356530313462663735356265396537346664666566323264 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit: BPF prog-id=140 op=LOAD Oct 2 19:16:49.159000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030e238 items=0 ppid=2528 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363331356530313462663735356265396537346664666566323264 Oct 2 19:16:49.159000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:16:49.159000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.159000 audit: BPF prog-id=141 op=LOAD Oct 2 19:16:49.159000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030e2c8 items=0 ppid=2528 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363331356530313462663735356265396537346664666566323264 Oct 2 19:16:49.333385 env[1138]: time="2023-10-02T19:16:49.330098542Z" level=info msg="StartContainer for \"186315e014bf755be9e74fdfef22d8d756a248306054e6427e38c0144e9e9f4c\" returns successfully" Oct 2 19:16:49.334088 systemd[1]: cri-containerd-186315e014bf755be9e74fdfef22d8d756a248306054e6427e38c0144e9e9f4c.scope: Deactivated successfully. Oct 2 19:16:49.336000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:16:49.358979 env[1138]: time="2023-10-02T19:16:49.356968483Z" level=info msg="shim disconnected" id=186315e014bf755be9e74fdfef22d8d756a248306054e6427e38c0144e9e9f4c Oct 2 19:16:49.358979 env[1138]: time="2023-10-02T19:16:49.357589176Z" level=warning msg="cleaning up after shim disconnected" id=186315e014bf755be9e74fdfef22d8d756a248306054e6427e38c0144e9e9f4c namespace=k8s.io Oct 2 19:16:49.358979 env[1138]: time="2023-10-02T19:16:49.357600925Z" level=info msg="cleaning up dead shim" Oct 2 19:16:49.363521 env[1138]: time="2023-10-02T19:16:49.363493818Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:16:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2725 runtime=io.containerd.runc.v2\n" Oct 2 19:16:49.617533 env[1138]: time="2023-10-02T19:16:49.617467233Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:16:50.107012 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-186315e014bf755be9e74fdfef22d8d756a248306054e6427e38c0144e9e9f4c-rootfs.mount: Deactivated successfully. Oct 2 19:16:50.935241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount669593405.mount: Deactivated successfully. Oct 2 19:16:53.249025 env[1138]: time="2023-10-02T19:16:53.248959539Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:53.250593 env[1138]: time="2023-10-02T19:16:53.250574351Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:53.252177 env[1138]: time="2023-10-02T19:16:53.252153132Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:53.253306 env[1138]: time="2023-10-02T19:16:53.253288808Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:53.253685 env[1138]: time="2023-10-02T19:16:53.253661959Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:16:53.255216 env[1138]: time="2023-10-02T19:16:53.255198477Z" level=info msg="CreateContainer within sandbox \"dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:16:53.261404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3903418607.mount: Deactivated successfully. Oct 2 19:16:53.264807 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount614224620.mount: Deactivated successfully. Oct 2 19:16:53.276095 env[1138]: time="2023-10-02T19:16:53.276055132Z" level=info msg="CreateContainer within sandbox \"dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a5035f53d96a1899a804062e058936d436077a63d2d008bd12476d752086c5af\"" Oct 2 19:16:53.276481 env[1138]: time="2023-10-02T19:16:53.276464159Z" level=info msg="StartContainer for \"a5035f53d96a1899a804062e058936d436077a63d2d008bd12476d752086c5af\"" Oct 2 19:16:53.295557 systemd[1]: Started cri-containerd-a5035f53d96a1899a804062e058936d436077a63d2d008bd12476d752086c5af.scope. Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.309837 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 2 19:16:53.312225 kernel: audit: type=1400 audit(1696274213.308:1140): avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.312249 kernel: audit: type=1300 audit(1696274213.308:1140): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2528 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:53.308000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2528 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:53.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303335663533643936613138393961383034303632653035383933 Oct 2 19:16:53.319233 kernel: audit: type=1327 audit(1696274213.308:1140): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303335663533643936613138393961383034303632653035383933 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.325636 kernel: audit: type=1400 audit(1696274213.308:1141): avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.325673 kernel: audit: type=1400 audit(1696274213.308:1141): avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.328311 kernel: audit: type=1400 audit(1696274213.308:1141): avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.332602 kernel: audit: type=1400 audit(1696274213.308:1141): avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.335618 kernel: audit: type=1400 audit(1696274213.308:1141): avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.338632 kernel: audit: type=1400 audit(1696274213.308:1141): avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.342872 kernel: audit: type=1400 audit(1696274213.308:1141): avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.308000 audit: BPF prog-id=142 op=LOAD Oct 2 19:16:53.308000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00038c1f0 items=0 ppid=2528 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:53.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303335663533643936613138393961383034303632653035383933 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.315000 audit: BPF prog-id=143 op=LOAD Oct 2 19:16:53.315000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00038c238 items=0 ppid=2528 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:53.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303335663533643936613138393961383034303632653035383933 Oct 2 19:16:53.318000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:16:53.318000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:53.318000 audit: BPF prog-id=144 op=LOAD Oct 2 19:16:53.318000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00038c2c8 items=0 ppid=2528 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:53.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303335663533643936613138393961383034303632653035383933 Oct 2 19:16:53.344519 env[1138]: time="2023-10-02T19:16:53.343096121Z" level=info msg="StartContainer for \"a5035f53d96a1899a804062e058936d436077a63d2d008bd12476d752086c5af\" returns successfully" Oct 2 19:16:55.518991 env[1138]: time="2023-10-02T19:16:55.518934995Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:16:55.521668 systemd[1]: cri-containerd-a5035f53d96a1899a804062e058936d436077a63d2d008bd12476d752086c5af.scope: Deactivated successfully. Oct 2 19:16:55.526000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:16:55.533687 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a5035f53d96a1899a804062e058936d436077a63d2d008bd12476d752086c5af-rootfs.mount: Deactivated successfully. Oct 2 19:16:55.536953 env[1138]: time="2023-10-02T19:16:55.536910518Z" level=info msg="shim disconnected" id=a5035f53d96a1899a804062e058936d436077a63d2d008bd12476d752086c5af Oct 2 19:16:55.536953 env[1138]: time="2023-10-02T19:16:55.536950555Z" level=warning msg="cleaning up after shim disconnected" id=a5035f53d96a1899a804062e058936d436077a63d2d008bd12476d752086c5af namespace=k8s.io Oct 2 19:16:55.537110 env[1138]: time="2023-10-02T19:16:55.536958881Z" level=info msg="cleaning up dead shim" Oct 2 19:16:55.541802 env[1138]: time="2023-10-02T19:16:55.541779893Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:16:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2797 runtime=io.containerd.runc.v2\n" Oct 2 19:16:55.614429 kubelet[2123]: I1002 19:16:55.613945 2123 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:16:55.628413 env[1138]: time="2023-10-02T19:16:55.628382060Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:16:55.643323 kubelet[2123]: I1002 19:16:55.643266 2123 topology_manager.go:215] "Topology Admit Handler" podUID="49e87e13-20e9-4288-a372-3be6bed3a306" podNamespace="kube-system" podName="coredns-5dd5756b68-pbjk9" Oct 2 19:16:55.652330 kubelet[2123]: I1002 19:16:55.652311 2123 topology_manager.go:215] "Topology Admit Handler" podUID="6abccd75-d298-43e6-9e81-26271a453c59" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-z45qb" Oct 2 19:16:55.652564 kubelet[2123]: I1002 19:16:55.652555 2123 topology_manager.go:215] "Topology Admit Handler" podUID="4e54baa8-8caa-47db-b190-b92e0aa549a0" podNamespace="kube-system" podName="coredns-5dd5756b68-zkt8b" Oct 2 19:16:55.655022 systemd[1]: Created slice kubepods-burstable-pod49e87e13_20e9_4288_a372_3be6bed3a306.slice. Oct 2 19:16:55.659214 systemd[1]: Created slice kubepods-besteffort-pod6abccd75_d298_43e6_9e81_26271a453c59.slice. Oct 2 19:16:55.663325 systemd[1]: Created slice kubepods-burstable-pod4e54baa8_8caa_47db_b190_b92e0aa549a0.slice. Oct 2 19:16:55.696376 kubelet[2123]: I1002 19:16:55.696359 2123 topology_manager.go:215] "Topology Admit Handler" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" podNamespace="calico-system" podName="csi-node-driver-s9jtb" Oct 2 19:16:55.699613 systemd[1]: Created slice kubepods-besteffort-poda749925a_c070_43fd_ae04_bc4172f6bc97.slice. Oct 2 19:16:55.738765 kubelet[2123]: I1002 19:16:55.738747 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/49e87e13-20e9-4288-a372-3be6bed3a306-config-volume\") pod \"coredns-5dd5756b68-pbjk9\" (UID: \"49e87e13-20e9-4288-a372-3be6bed3a306\") " pod="kube-system/coredns-5dd5756b68-pbjk9" Oct 2 19:16:55.738902 kubelet[2123]: I1002 19:16:55.738895 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a749925a-c070-43fd-ae04-bc4172f6bc97-registration-dir\") pod \"csi-node-driver-s9jtb\" (UID: \"a749925a-c070-43fd-ae04-bc4172f6bc97\") " pod="calico-system/csi-node-driver-s9jtb" Oct 2 19:16:55.739024 kubelet[2123]: I1002 19:16:55.739017 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a749925a-c070-43fd-ae04-bc4172f6bc97-varrun\") pod \"csi-node-driver-s9jtb\" (UID: \"a749925a-c070-43fd-ae04-bc4172f6bc97\") " pod="calico-system/csi-node-driver-s9jtb" Oct 2 19:16:55.739087 kubelet[2123]: I1002 19:16:55.739081 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a749925a-c070-43fd-ae04-bc4172f6bc97-socket-dir\") pod \"csi-node-driver-s9jtb\" (UID: \"a749925a-c070-43fd-ae04-bc4172f6bc97\") " pod="calico-system/csi-node-driver-s9jtb" Oct 2 19:16:55.739157 kubelet[2123]: I1002 19:16:55.739141 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8hvd\" (UniqueName: \"kubernetes.io/projected/a749925a-c070-43fd-ae04-bc4172f6bc97-kube-api-access-l8hvd\") pod \"csi-node-driver-s9jtb\" (UID: \"a749925a-c070-43fd-ae04-bc4172f6bc97\") " pod="calico-system/csi-node-driver-s9jtb" Oct 2 19:16:55.739212 kubelet[2123]: I1002 19:16:55.739205 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bl8x7\" (UniqueName: \"kubernetes.io/projected/49e87e13-20e9-4288-a372-3be6bed3a306-kube-api-access-bl8x7\") pod \"coredns-5dd5756b68-pbjk9\" (UID: \"49e87e13-20e9-4288-a372-3be6bed3a306\") " pod="kube-system/coredns-5dd5756b68-pbjk9" Oct 2 19:16:55.739275 kubelet[2123]: I1002 19:16:55.739268 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4e54baa8-8caa-47db-b190-b92e0aa549a0-config-volume\") pod \"coredns-5dd5756b68-zkt8b\" (UID: \"4e54baa8-8caa-47db-b190-b92e0aa549a0\") " pod="kube-system/coredns-5dd5756b68-zkt8b" Oct 2 19:16:55.739341 kubelet[2123]: I1002 19:16:55.739336 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prhjs\" (UniqueName: \"kubernetes.io/projected/6abccd75-d298-43e6-9e81-26271a453c59-kube-api-access-prhjs\") pod \"calico-kube-controllers-74b9887bb6-z45qb\" (UID: \"6abccd75-d298-43e6-9e81-26271a453c59\") " pod="calico-system/calico-kube-controllers-74b9887bb6-z45qb" Oct 2 19:16:55.739413 kubelet[2123]: I1002 19:16:55.739397 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a749925a-c070-43fd-ae04-bc4172f6bc97-kubelet-dir\") pod \"csi-node-driver-s9jtb\" (UID: \"a749925a-c070-43fd-ae04-bc4172f6bc97\") " pod="calico-system/csi-node-driver-s9jtb" Oct 2 19:16:55.739472 kubelet[2123]: I1002 19:16:55.739465 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/a749925a-c070-43fd-ae04-bc4172f6bc97-etccalico\") pod \"csi-node-driver-s9jtb\" (UID: \"a749925a-c070-43fd-ae04-bc4172f6bc97\") " pod="calico-system/csi-node-driver-s9jtb" Oct 2 19:16:55.739547 kubelet[2123]: I1002 19:16:55.739526 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2hvbd\" (UniqueName: \"kubernetes.io/projected/4e54baa8-8caa-47db-b190-b92e0aa549a0-kube-api-access-2hvbd\") pod \"coredns-5dd5756b68-zkt8b\" (UID: \"4e54baa8-8caa-47db-b190-b92e0aa549a0\") " pod="kube-system/coredns-5dd5756b68-zkt8b" Oct 2 19:16:55.958259 env[1138]: time="2023-10-02T19:16:55.957904632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-pbjk9,Uid:49e87e13-20e9-4288-a372-3be6bed3a306,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:55.962716 env[1138]: time="2023-10-02T19:16:55.962652643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-z45qb,Uid:6abccd75-d298-43e6-9e81-26271a453c59,Namespace:calico-system,Attempt:0,}" Oct 2 19:16:55.967922 env[1138]: time="2023-10-02T19:16:55.967901290Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-zkt8b,Uid:4e54baa8-8caa-47db-b190-b92e0aa549a0,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:56.002424 env[1138]: time="2023-10-02T19:16:56.002396613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s9jtb,Uid:a749925a-c070-43fd-ae04-bc4172f6bc97,Namespace:calico-system,Attempt:0,}" Oct 2 19:16:56.058214 env[1138]: time="2023-10-02T19:16:56.058164099Z" level=error msg="Failed to destroy network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.058463 env[1138]: time="2023-10-02T19:16:56.058441058Z" level=error msg="encountered an error cleaning up failed sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.058514 env[1138]: time="2023-10-02T19:16:56.058476200Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-zkt8b,Uid:4e54baa8-8caa-47db-b190-b92e0aa549a0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.062256 kubelet[2123]: E1002 19:16:56.061894 2123 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.062256 kubelet[2123]: E1002 19:16:56.062090 2123 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-zkt8b" Oct 2 19:16:56.062256 kubelet[2123]: E1002 19:16:56.062108 2123 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-zkt8b" Oct 2 19:16:56.062562 kubelet[2123]: E1002 19:16:56.062522 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-zkt8b_kube-system(4e54baa8-8caa-47db-b190-b92e0aa549a0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-zkt8b_kube-system(4e54baa8-8caa-47db-b190-b92e0aa549a0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-zkt8b" podUID="4e54baa8-8caa-47db-b190-b92e0aa549a0" Oct 2 19:16:56.065736 env[1138]: time="2023-10-02T19:16:56.065693671Z" level=error msg="Failed to destroy network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.066078 env[1138]: time="2023-10-02T19:16:56.066060880Z" level=error msg="encountered an error cleaning up failed sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.066164 env[1138]: time="2023-10-02T19:16:56.066148176Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s9jtb,Uid:a749925a-c070-43fd-ae04-bc4172f6bc97,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.066552 kubelet[2123]: E1002 19:16:56.066340 2123 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.066552 kubelet[2123]: E1002 19:16:56.066369 2123 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-s9jtb" Oct 2 19:16:56.066552 kubelet[2123]: E1002 19:16:56.066385 2123 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-s9jtb" Oct 2 19:16:56.066666 kubelet[2123]: E1002 19:16:56.066419 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-s9jtb_calico-system(a749925a-c070-43fd-ae04-bc4172f6bc97)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-s9jtb_calico-system(a749925a-c070-43fd-ae04-bc4172f6bc97)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-s9jtb" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" Oct 2 19:16:56.072863 env[1138]: time="2023-10-02T19:16:56.072827635Z" level=error msg="Failed to destroy network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.073086 env[1138]: time="2023-10-02T19:16:56.073064311Z" level=error msg="encountered an error cleaning up failed sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.073141 env[1138]: time="2023-10-02T19:16:56.073098892Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-pbjk9,Uid:49e87e13-20e9-4288-a372-3be6bed3a306,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.073453 kubelet[2123]: E1002 19:16:56.073232 2123 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.073453 kubelet[2123]: E1002 19:16:56.073268 2123 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-pbjk9" Oct 2 19:16:56.073453 kubelet[2123]: E1002 19:16:56.073292 2123 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-pbjk9" Oct 2 19:16:56.073585 kubelet[2123]: E1002 19:16:56.073324 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-pbjk9_kube-system(49e87e13-20e9-4288-a372-3be6bed3a306)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-pbjk9_kube-system(49e87e13-20e9-4288-a372-3be6bed3a306)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-pbjk9" podUID="49e87e13-20e9-4288-a372-3be6bed3a306" Oct 2 19:16:56.083447 env[1138]: time="2023-10-02T19:16:56.083403311Z" level=error msg="Failed to destroy network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.083673 env[1138]: time="2023-10-02T19:16:56.083650556Z" level=error msg="encountered an error cleaning up failed sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.083721 env[1138]: time="2023-10-02T19:16:56.083687617Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-z45qb,Uid:6abccd75-d298-43e6-9e81-26271a453c59,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.083891 kubelet[2123]: E1002 19:16:56.083875 2123 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.083941 kubelet[2123]: E1002 19:16:56.083909 2123 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-z45qb" Oct 2 19:16:56.083941 kubelet[2123]: E1002 19:16:56.083923 2123 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-z45qb" Oct 2 19:16:56.083984 kubelet[2123]: E1002 19:16:56.083961 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-z45qb_calico-system(6abccd75-d298-43e6-9e81-26271a453c59)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-z45qb_calico-system(6abccd75-d298-43e6-9e81-26271a453c59)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-z45qb" podUID="6abccd75-d298-43e6-9e81-26271a453c59" Oct 2 19:16:56.629726 kubelet[2123]: I1002 19:16:56.629696 2123 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:16:56.630395 kubelet[2123]: I1002 19:16:56.630377 2123 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:16:56.634886 env[1138]: time="2023-10-02T19:16:56.634861662Z" level=info msg="StopPodSandbox for \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\"" Oct 2 19:16:56.635630 env[1138]: time="2023-10-02T19:16:56.635612291Z" level=info msg="StopPodSandbox for \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\"" Oct 2 19:16:56.636431 kubelet[2123]: I1002 19:16:56.636416 2123 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:16:56.637031 env[1138]: time="2023-10-02T19:16:56.637017142Z" level=info msg="StopPodSandbox for \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\"" Oct 2 19:16:56.638493 kubelet[2123]: I1002 19:16:56.638467 2123 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:16:56.639474 env[1138]: time="2023-10-02T19:16:56.639327529Z" level=info msg="StopPodSandbox for \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\"" Oct 2 19:16:56.673086 env[1138]: time="2023-10-02T19:16:56.673053531Z" level=error msg="StopPodSandbox for \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\" failed" error="failed to destroy network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.673411 kubelet[2123]: E1002 19:16:56.673394 2123 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:16:56.673694 kubelet[2123]: E1002 19:16:56.673677 2123 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb"} Oct 2 19:16:56.673731 kubelet[2123]: E1002 19:16:56.673705 2123 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e54baa8-8caa-47db-b190-b92e0aa549a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:16:56.673783 kubelet[2123]: E1002 19:16:56.673734 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e54baa8-8caa-47db-b190-b92e0aa549a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-zkt8b" podUID="4e54baa8-8caa-47db-b190-b92e0aa549a0" Oct 2 19:16:56.677718 env[1138]: time="2023-10-02T19:16:56.677693929Z" level=error msg="StopPodSandbox for \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\" failed" error="failed to destroy network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.677910 kubelet[2123]: E1002 19:16:56.677897 2123 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:16:56.677950 kubelet[2123]: E1002 19:16:56.677924 2123 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591"} Oct 2 19:16:56.677950 kubelet[2123]: E1002 19:16:56.677946 2123 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"49e87e13-20e9-4288-a372-3be6bed3a306\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:16:56.678012 kubelet[2123]: E1002 19:16:56.677961 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"49e87e13-20e9-4288-a372-3be6bed3a306\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-pbjk9" podUID="49e87e13-20e9-4288-a372-3be6bed3a306" Oct 2 19:16:56.679166 env[1138]: time="2023-10-02T19:16:56.679145740Z" level=error msg="StopPodSandbox for \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\" failed" error="failed to destroy network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.679315 kubelet[2123]: E1002 19:16:56.679305 2123 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:16:56.679472 kubelet[2123]: E1002 19:16:56.679320 2123 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad"} Oct 2 19:16:56.679472 kubelet[2123]: E1002 19:16:56.679349 2123 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6abccd75-d298-43e6-9e81-26271a453c59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:16:56.679472 kubelet[2123]: E1002 19:16:56.679367 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6abccd75-d298-43e6-9e81-26271a453c59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-z45qb" podUID="6abccd75-d298-43e6-9e81-26271a453c59" Oct 2 19:16:56.685596 env[1138]: time="2023-10-02T19:16:56.685575517Z" level=error msg="StopPodSandbox for \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\" failed" error="failed to destroy network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:56.685755 kubelet[2123]: E1002 19:16:56.685743 2123 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:16:56.685859 kubelet[2123]: E1002 19:16:56.685761 2123 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb"} Oct 2 19:16:56.685859 kubelet[2123]: E1002 19:16:56.685797 2123 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a749925a-c070-43fd-ae04-bc4172f6bc97\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:16:56.685859 kubelet[2123]: E1002 19:16:56.685813 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a749925a-c070-43fd-ae04-bc4172f6bc97\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-s9jtb" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" Oct 2 19:16:59.482860 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2590385716.mount: Deactivated successfully. Oct 2 19:16:59.574288 env[1138]: time="2023-10-02T19:16:59.574260821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:59.574956 env[1138]: time="2023-10-02T19:16:59.574937689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:59.575275 env[1138]: time="2023-10-02T19:16:59.575258715Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:59.575878 env[1138]: time="2023-10-02T19:16:59.575859549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:59.576031 env[1138]: time="2023-10-02T19:16:59.576013255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:16:59.578683 env[1138]: time="2023-10-02T19:16:59.578662555Z" level=info msg="CreateContainer within sandbox \"dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:16:59.584735 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount95106390.mount: Deactivated successfully. Oct 2 19:16:59.587445 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount39416179.mount: Deactivated successfully. Oct 2 19:16:59.598871 env[1138]: time="2023-10-02T19:16:59.598846167Z" level=info msg="CreateContainer within sandbox \"dd988464edffa1847e239ff895ebaaf7e44cebb646c2409be6b08070d7ba6712\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98\"" Oct 2 19:16:59.599503 env[1138]: time="2023-10-02T19:16:59.599491019Z" level=info msg="StartContainer for \"70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98\"" Oct 2 19:16:59.619818 systemd[1]: Started cri-containerd-70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98.scope. Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.646891 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:16:59.653974 kernel: audit: type=1400 audit(1696274219.631:1147): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.654018 kernel: audit: type=1300 audit(1696274219.631:1147): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2528 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.656966 kernel: audit: type=1327 audit(1696274219.631:1147): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730646366623530333936346439613933376136643964386264316331 Oct 2 19:16:59.656995 kernel: audit: type=1400 audit(1696274219.631:1148): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.657011 kernel: audit: type=1400 audit(1696274219.631:1148): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.657029 kernel: audit: type=1400 audit(1696274219.631:1148): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2528 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.659631 kernel: audit: type=1400 audit(1696274219.631:1148): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730646366623530333936346439613933376136643964386264316331 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.665019 env[1138]: time="2023-10-02T19:16:59.664994555Z" level=info msg="StartContainer for \"70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98\" returns successfully" Oct 2 19:16:59.666441 kernel: audit: type=1400 audit(1696274219.631:1148): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.666514 kernel: audit: type=1400 audit(1696274219.631:1148): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.666550 kernel: audit: type=1400 audit(1696274219.631:1148): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.631000 audit: BPF prog-id=145 op=LOAD Oct 2 19:16:59.631000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027a4f0 items=0 ppid=2528 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730646366623530333936346439613933376136643964386264316331 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.638000 audit: BPF prog-id=146 op=LOAD Oct 2 19:16:59.638000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027a538 items=0 ppid=2528 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730646366623530333936346439613933376136643964386264316331 Oct 2 19:16:59.641000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:16:59.641000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:59.641000 audit: BPF prog-id=147 op=LOAD Oct 2 19:16:59.641000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027a5c8 items=0 ppid=2528 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730646366623530333936346439613933376136643964386264316331 Oct 2 19:16:59.751298 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:16:59.751401 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:17:00.671384 systemd[1]: run-containerd-runc-k8s.io-70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98-runc.pkRBSY.mount: Deactivated successfully. Oct 2 19:17:00.673934 kubelet[2123]: I1002 19:17:00.673911 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-w94cw" podStartSLOduration=2.106940735 podCreationTimestamp="2023-10-02 19:16:43 +0000 UTC" firstStartedPulling="2023-10-02 19:16:44.017663546 +0000 UTC m=+19.534037206" lastFinishedPulling="2023-10-02 19:16:59.576464889 +0000 UTC m=+35.092838552" observedRunningTime="2023-10-02 19:17:00.663499667 +0000 UTC m=+36.179873350" watchObservedRunningTime="2023-10-02 19:17:00.665742081 +0000 UTC m=+36.182115746" Oct 2 19:17:01.014000 audit[3152]: AVC avc: denied { write } for pid=3152 comm="tee" name="fd" dev="proc" ino=34699 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:01.014000 audit[3152]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd98841995 a2=241 a3=1b6 items=1 ppid=3117 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.014000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:17:01.014000 audit: PATH item=0 name="/dev/fd/63" inode=34684 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:01.014000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:01.024000 audit[3155]: AVC avc: denied { write } for pid=3155 comm="tee" name="fd" dev="proc" ino=34865 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:01.024000 audit[3155]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1f3a0993 a2=241 a3=1b6 items=1 ppid=3121 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.024000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:17:01.024000 audit: PATH item=0 name="/dev/fd/63" inode=34861 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:01.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:01.025000 audit[3158]: AVC avc: denied { write } for pid=3158 comm="tee" name="fd" dev="proc" ino=34721 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:01.025000 audit[3158]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe73516984 a2=241 a3=1b6 items=1 ppid=3115 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.025000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:17:01.025000 audit: PATH item=0 name="/dev/fd/63" inode=34862 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:01.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:01.030000 audit[3172]: AVC avc: denied { write } for pid=3172 comm="tee" name="fd" dev="proc" ino=34728 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:01.030000 audit[3172]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd33bde993 a2=241 a3=1b6 items=1 ppid=3125 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.030000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:17:01.030000 audit: PATH item=0 name="/dev/fd/63" inode=34703 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:01.030000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:01.040000 audit[3177]: AVC avc: denied { write } for pid=3177 comm="tee" name="fd" dev="proc" ino=34873 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:01.041000 audit[3175]: AVC avc: denied { write } for pid=3175 comm="tee" name="fd" dev="proc" ino=34876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:01.041000 audit[3175]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc188cb994 a2=241 a3=1b6 items=1 ppid=3123 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.041000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:17:01.041000 audit: PATH item=0 name="/dev/fd/63" inode=34706 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:01.041000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:01.042000 audit[3179]: AVC avc: denied { write } for pid=3179 comm="tee" name="fd" dev="proc" ino=34738 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:01.040000 audit[3177]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe44549983 a2=241 a3=1b6 items=1 ppid=3134 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.040000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:17:01.040000 audit: PATH item=0 name="/dev/fd/63" inode=34709 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:01.040000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:01.042000 audit[3179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcdaf84993 a2=241 a3=1b6 items=1 ppid=3131 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.042000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:17:01.042000 audit: PATH item=0 name="/dev/fd/63" inode=34712 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:01.042000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit: BPF prog-id=148 op=LOAD Oct 2 19:17:01.351000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc4386a730 a2=70 a3=7f708e710000 items=0 ppid=3132 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:01.351000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit: BPF prog-id=149 op=LOAD Oct 2 19:17:01.351000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc4386a730 a2=70 a3=6e items=0 ppid=3132 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:01.351000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc4386a6e0 a2=70 a3=7ffc4386a730 items=0 ppid=3132 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit: BPF prog-id=150 op=LOAD Oct 2 19:17:01.351000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc4386a6c0 a2=70 a3=7ffc4386a730 items=0 ppid=3132 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:01.351000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4386a7a0 a2=70 a3=0 items=0 ppid=3132 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4386a790 a2=70 a3=0 items=0 ppid=3132 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:01.351000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.351000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc4386a7d0 a2=70 a3=0 items=0 ppid=3132 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.352000 audit: BPF prog-id=151 op=LOAD Oct 2 19:17:01.352000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc4386a6f0 a2=70 a3=ffffffff items=0 ppid=3132 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:01.356000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.356000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeff15bcd0 a2=70 a3=fff80800 items=0 ppid=3132 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:17:01.356000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:01.356000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeff15bba0 a2=70 a3=3 items=0 ppid=3132 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:17:01.361000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:17:01.500000 audit[3291]: NETFILTER_CFG table=mangle:99 family=2 entries=19 op=nft_register_chain pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:01.500000 audit[3291]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffed44035d0 a2=0 a3=7ffed44035bc items=0 ppid=3132 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.500000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:01.512000 audit[3285]: NETFILTER_CFG table=raw:100 family=2 entries=19 op=nft_register_chain pid=3285 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:01.512000 audit[3285]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc8da0c600 a2=0 a3=56019fb73000 items=0 ppid=3132 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.512000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:01.513000 audit[3286]: NETFILTER_CFG table=nat:101 family=2 entries=16 op=nft_register_chain pid=3286 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:01.513000 audit[3286]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe5bf1ff90 a2=0 a3=557edb95d000 items=0 ppid=3132 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.513000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:01.514000 audit[3287]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3287 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:01.514000 audit[3287]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fffa396e1b0 a2=0 a3=55e310f45000 items=0 ppid=3132 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:01.514000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:01.662432 systemd[1]: run-containerd-runc-k8s.io-70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98-runc.6Pe9MZ.mount: Deactivated successfully. Oct 2 19:17:02.172534 systemd-networkd[1052]: vxlan.calico: Link UP Oct 2 19:17:02.172538 systemd-networkd[1052]: vxlan.calico: Gained carrier Oct 2 19:17:03.868703 systemd-networkd[1052]: vxlan.calico: Gained IPv6LL Oct 2 19:17:03.966909 systemd[1]: run-containerd-runc-k8s.io-70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98-runc.eA2N9V.mount: Deactivated successfully. Oct 2 19:17:07.571660 env[1138]: time="2023-10-02T19:17:07.571628461Z" level=info msg="StopPodSandbox for \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\"" Oct 2 19:17:07.572230 env[1138]: time="2023-10-02T19:17:07.571639894Z" level=info msg="StopPodSandbox for \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\"" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:07.680 [INFO][3409] k8s.go 576: Cleaning up netns ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:07.682 [INFO][3409] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" iface="eth0" netns="/var/run/netns/cni-cea86297-5e49-4c43-94d4-0f8fa5bd27ea" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:07.682 [INFO][3409] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" iface="eth0" netns="/var/run/netns/cni-cea86297-5e49-4c43-94d4-0f8fa5bd27ea" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:07.683 [INFO][3409] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" iface="eth0" netns="/var/run/netns/cni-cea86297-5e49-4c43-94d4-0f8fa5bd27ea" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:07.683 [INFO][3409] k8s.go 583: Releasing IP address(es) ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:07.683 [INFO][3409] utils.go 196: Calico CNI releasing IP address ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:08.042 [INFO][3422] ipam_plugin.go 416: Releasing address using handleID ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.060657 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:08.060657 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:08.056 [WARNING][3422] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:08.056 [INFO][3422] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.060657 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:08.060657 env[1138]: 2023-10-02 19:17:08.058 [INFO][3409] k8s.go 589: Teardown processing complete. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:08.060500 systemd[1]: run-netns-cni\x2dcea86297\x2d5e49\x2d4c43\x2d94d4\x2d0f8fa5bd27ea.mount: Deactivated successfully. Oct 2 19:17:08.063497 env[1138]: time="2023-10-02T19:17:08.061042687Z" level=info msg="TearDown network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\" successfully" Oct 2 19:17:08.063497 env[1138]: time="2023-10-02T19:17:08.061066513Z" level=info msg="StopPodSandbox for \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\" returns successfully" Oct 2 19:17:08.064301 env[1138]: time="2023-10-02T19:17:08.064280360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-zkt8b,Uid:4e54baa8-8caa-47db-b190-b92e0aa549a0,Namespace:kube-system,Attempt:1,}" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:07.685 [INFO][3410] k8s.go 576: Cleaning up netns ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:07.685 [INFO][3410] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" iface="eth0" netns="/var/run/netns/cni-b8dd8e18-f9db-1443-5383-5f9ece849ece" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:07.685 [INFO][3410] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" iface="eth0" netns="/var/run/netns/cni-b8dd8e18-f9db-1443-5383-5f9ece849ece" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:07.686 [INFO][3410] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" iface="eth0" netns="/var/run/netns/cni-b8dd8e18-f9db-1443-5383-5f9ece849ece" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:07.686 [INFO][3410] k8s.go 583: Releasing IP address(es) ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:07.686 [INFO][3410] utils.go 196: Calico CNI releasing IP address ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:08.042 [INFO][3423] ipam_plugin.go 416: Releasing address using handleID ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.070082 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:08.070082 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:08.064 [WARNING][3423] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:08.064 [INFO][3423] ipam_plugin.go 444: Releasing address using workloadID ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.070082 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:08.070082 env[1138]: 2023-10-02 19:17:08.067 [INFO][3410] k8s.go 589: Teardown processing complete. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:08.071438 systemd[1]: run-netns-cni\x2db8dd8e18\x2df9db\x2d1443\x2d5383\x2d5f9ece849ece.mount: Deactivated successfully. Oct 2 19:17:08.071780 env[1138]: time="2023-10-02T19:17:08.071759062Z" level=info msg="TearDown network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\" successfully" Oct 2 19:17:08.071834 env[1138]: time="2023-10-02T19:17:08.071823060Z" level=info msg="StopPodSandbox for \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\" returns successfully" Oct 2 19:17:08.072329 env[1138]: time="2023-10-02T19:17:08.072316347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-z45qb,Uid:6abccd75-d298-43e6-9e81-26271a453c59,Namespace:calico-system,Attempt:1,}" Oct 2 19:17:08.195035 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:17:08.199831 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali17b7e7d9212: link becomes ready Oct 2 19:17:08.201360 systemd-networkd[1052]: cali17b7e7d9212: Link UP Oct 2 19:17:08.201364 systemd-networkd[1052]: cali17b7e7d9212: Gained carrier Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.111 [INFO][3434] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--zkt8b-eth0 coredns-5dd5756b68- kube-system 4e54baa8-8caa-47db-b190-b92e0aa549a0 689 0 2023-10-02 19:16:39 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-zkt8b eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali17b7e7d9212 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Namespace="kube-system" Pod="coredns-5dd5756b68-zkt8b" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--zkt8b-" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.112 [INFO][3434] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Namespace="kube-system" Pod="coredns-5dd5756b68-zkt8b" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.145 [INFO][3456] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" HandleID="k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.158 [INFO][3456] ipam_plugin.go 269: Auto assigning IP ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" HandleID="k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004dfb0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-zkt8b", "timestamp":"2023-10-02 19:17:08.145750921 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:17:08.214165 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:08.214165 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.158 [INFO][3456] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.162 [INFO][3456] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" host="localhost" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.171 [INFO][3456] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.173 [INFO][3456] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.178 [INFO][3456] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.179 [INFO][3456] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.179 [INFO][3456] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" host="localhost" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.179 [INFO][3456] ipam.go 1682: Creating new handle: k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10 Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.181 [INFO][3456] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" host="localhost" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.185 [INFO][3456] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" host="localhost" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.185 [INFO][3456] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" host="localhost" Oct 2 19:17:08.214165 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:08.214165 env[1138]: 2023-10-02 19:17:08.185 [INFO][3456] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" HandleID="k8s-pod-network.d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.214630 env[1138]: 2023-10-02 19:17:08.187 [INFO][3434] k8s.go 383: Populated endpoint ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Namespace="kube-system" Pod="coredns-5dd5756b68-zkt8b" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--zkt8b-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"4e54baa8-8caa-47db-b190-b92e0aa549a0", ResourceVersion:"689", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-zkt8b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali17b7e7d9212", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:08.214630 env[1138]: 2023-10-02 19:17:08.187 [INFO][3434] k8s.go 384: Calico CNI using IPs: [192.168.88.129/32] ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Namespace="kube-system" Pod="coredns-5dd5756b68-zkt8b" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.214630 env[1138]: 2023-10-02 19:17:08.187 [INFO][3434] dataplane_linux.go 68: Setting the host side veth name to cali17b7e7d9212 ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Namespace="kube-system" Pod="coredns-5dd5756b68-zkt8b" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.214630 env[1138]: 2023-10-02 19:17:08.195 [INFO][3434] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Namespace="kube-system" Pod="coredns-5dd5756b68-zkt8b" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.214630 env[1138]: 2023-10-02 19:17:08.201 [INFO][3434] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Namespace="kube-system" Pod="coredns-5dd5756b68-zkt8b" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--zkt8b-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"4e54baa8-8caa-47db-b190-b92e0aa549a0", ResourceVersion:"689", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10", Pod:"coredns-5dd5756b68-zkt8b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali17b7e7d9212", MAC:"46:27:b1:ee:7e:5b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:08.214630 env[1138]: 2023-10-02 19:17:08.213 [INFO][3434] k8s.go 489: Wrote updated endpoint to datastore ContainerID="d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10" Namespace="kube-system" Pod="coredns-5dd5756b68-zkt8b" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:08.218586 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicfa0c5ef45d: link becomes ready Oct 2 19:17:08.221885 systemd-networkd[1052]: calicfa0c5ef45d: Link UP Oct 2 19:17:08.221890 systemd-networkd[1052]: calicfa0c5ef45d: Gained carrier Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.125 [INFO][3439] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0 calico-kube-controllers-74b9887bb6- calico-system 6abccd75-d298-43e6-9e81-26271a453c59 690 0 2023-10-02 19:16:43 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-74b9887bb6-z45qb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicfa0c5ef45d [] []}} ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-z45qb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.125 [INFO][3439] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-z45qb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.165 [INFO][3457] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" HandleID="k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.170 [INFO][3457] ipam_plugin.go 269: Auto assigning IP ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" HandleID="k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004c140), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-74b9887bb6-z45qb", "timestamp":"2023-10-02 19:17:08.165590635 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:17:08.230690 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:08.230690 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.185 [INFO][3457] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.187 [INFO][3457] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" host="localhost" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.189 [INFO][3457] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.194 [INFO][3457] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.195 [INFO][3457] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.196 [INFO][3457] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.197 [INFO][3457] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" host="localhost" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.197 [INFO][3457] ipam.go 1682: Creating new handle: k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933 Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.199 [INFO][3457] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" host="localhost" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.210 [INFO][3457] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" host="localhost" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.214 [INFO][3457] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" host="localhost" Oct 2 19:17:08.230690 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:08.230690 env[1138]: 2023-10-02 19:17:08.214 [INFO][3457] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" HandleID="k8s-pod-network.3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.239687 env[1138]: 2023-10-02 19:17:08.215 [INFO][3439] k8s.go 383: Populated endpoint ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-z45qb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"6abccd75-d298-43e6-9e81-26271a453c59", ResourceVersion:"690", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-z45qb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicfa0c5ef45d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:08.239687 env[1138]: 2023-10-02 19:17:08.216 [INFO][3439] k8s.go 384: Calico CNI using IPs: [192.168.88.130/32] ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-z45qb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.239687 env[1138]: 2023-10-02 19:17:08.216 [INFO][3439] dataplane_linux.go 68: Setting the host side veth name to calicfa0c5ef45d ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-z45qb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.239687 env[1138]: 2023-10-02 19:17:08.217 [INFO][3439] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-z45qb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.239687 env[1138]: 2023-10-02 19:17:08.222 [INFO][3439] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-z45qb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"6abccd75-d298-43e6-9e81-26271a453c59", ResourceVersion:"690", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933", Pod:"calico-kube-controllers-74b9887bb6-z45qb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicfa0c5ef45d", MAC:"82:98:bf:55:ec:73", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:08.239687 env[1138]: 2023-10-02 19:17:08.228 [INFO][3439] k8s.go 489: Wrote updated endpoint to datastore ContainerID="3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-z45qb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:08.239687 env[1138]: time="2023-10-02T19:17:08.234619577Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:08.239687 env[1138]: time="2023-10-02T19:17:08.234649300Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:08.239687 env[1138]: time="2023-10-02T19:17:08.234656218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:08.239687 env[1138]: time="2023-10-02T19:17:08.234744481Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10 pid=3492 runtime=io.containerd.runc.v2 Oct 2 19:17:08.249753 systemd[1]: Started cri-containerd-d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10.scope. Oct 2 19:17:08.255237 env[1138]: time="2023-10-02T19:17:08.255190916Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:08.255383 env[1138]: time="2023-10-02T19:17:08.255368063Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:08.255449 env[1138]: time="2023-10-02T19:17:08.255436677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:08.255705 env[1138]: time="2023-10-02T19:17:08.255677579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933 pid=3524 runtime=io.containerd.runc.v2 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.263262 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:17:08.263298 kernel: audit: type=1400 audit(1696274228.260:1178): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.267734 kernel: audit: type=1400 audit(1696274228.260:1179): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.270788 kernel: audit: type=1400 audit(1696274228.260:1180): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.275482 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:17:08.278293 kernel: audit: type=1400 audit(1696274228.260:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.278320 kernel: audit: type=1400 audit(1696274228.260:1182): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.278335 kernel: audit: type=1400 audit(1696274228.260:1183): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.282992 kernel: audit: type=1400 audit(1696274228.260:1184): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.285702 kernel: audit: type=1400 audit(1696274228.260:1185): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.285734 kernel: audit: type=1400 audit(1696274228.260:1186): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.288061 kernel: audit: type=1400 audit(1696274228.260:1187): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit: BPF prog-id=152 op=LOAD Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3492 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363562393062353836643835353630613266383363346237353363 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3492 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363562393062353836643835353630613266383363346237353363 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit: BPF prog-id=153 op=LOAD Oct 2 19:17:08.260000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218d30 items=0 ppid=3492 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363562393062353836643835353630613266383363346237353363 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit: BPF prog-id=154 op=LOAD Oct 2 19:17:08.260000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218d78 items=0 ppid=3492 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363562393062353836643835353630613266383363346237353363 Oct 2 19:17:08.260000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:17:08.260000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.260000 audit: BPF prog-id=155 op=LOAD Oct 2 19:17:08.260000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219188 items=0 ppid=3492 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363562393062353836643835353630613266383363346237353363 Oct 2 19:17:08.274000 audit[3546]: NETFILTER_CFG table=filter:103 family=2 entries=68 op=nft_register_chain pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:08.274000 audit[3546]: SYSCALL arch=c000003e syscall=46 success=yes exit=38072 a0=3 a1=7fff0c0e7f50 a2=0 a3=7fff0c0e7f3c items=0 ppid=3132 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.274000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:08.299308 systemd[1]: Started cri-containerd-3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933.scope. Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit: BPF prog-id=156 op=LOAD Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3524 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333393861303563663164343735353534656530366234633938313936 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3524 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333393861303563663164343735353534656530366234633938313936 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.325000 audit: BPF prog-id=157 op=LOAD Oct 2 19:17:08.325000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000290360 items=0 ppid=3524 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333393861303563663164343735353534656530366234633938313936 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit: BPF prog-id=158 op=LOAD Oct 2 19:17:08.326000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002903a8 items=0 ppid=3524 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333393861303563663164343735353534656530366234633938313936 Oct 2 19:17:08.326000 audit: BPF prog-id=158 op=UNLOAD Oct 2 19:17:08.326000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.326000 audit: BPF prog-id=159 op=LOAD Oct 2 19:17:08.326000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002907b8 items=0 ppid=3524 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333393861303563663164343735353534656530366234633938313936 Oct 2 19:17:08.329968 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:17:08.340691 env[1138]: time="2023-10-02T19:17:08.333230556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-zkt8b,Uid:4e54baa8-8caa-47db-b190-b92e0aa549a0,Namespace:kube-system,Attempt:1,} returns sandbox id \"d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10\"" Oct 2 19:17:08.341371 env[1138]: time="2023-10-02T19:17:08.341354482Z" level=info msg="CreateContainer within sandbox \"d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:17:08.353315 env[1138]: time="2023-10-02T19:17:08.353292493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-z45qb,Uid:6abccd75-d298-43e6-9e81-26271a453c59,Namespace:calico-system,Attempt:1,} returns sandbox id \"3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933\"" Oct 2 19:17:08.354375 env[1138]: time="2023-10-02T19:17:08.354362669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:17:08.400247 env[1138]: time="2023-10-02T19:17:08.400215861Z" level=info msg="CreateContainer within sandbox \"d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b99a8f5bc1d841bc0a20751da2d8c0b5b2b491fc73a43377d19f6813f99182cc\"" Oct 2 19:17:08.402196 env[1138]: time="2023-10-02T19:17:08.400596869Z" level=info msg="StartContainer for \"b99a8f5bc1d841bc0a20751da2d8c0b5b2b491fc73a43377d19f6813f99182cc\"" Oct 2 19:17:08.411143 systemd[1]: Started cri-containerd-b99a8f5bc1d841bc0a20751da2d8c0b5b2b491fc73a43377d19f6813f99182cc.scope. Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit: BPF prog-id=160 op=LOAD Oct 2 19:17:08.420000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.420000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3492 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239396138663562633164383431626330613230373531646132643863 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3492 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239396138663562633164383431626330613230373531646132643863 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit: BPF prog-id=161 op=LOAD Oct 2 19:17:08.421000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003280a0 items=0 ppid=3492 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239396138663562633164383431626330613230373531646132643863 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.421000 audit: BPF prog-id=162 op=LOAD Oct 2 19:17:08.421000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003280e8 items=0 ppid=3492 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239396138663562633164383431626330613230373531646132643863 Oct 2 19:17:08.422000 audit: BPF prog-id=162 op=UNLOAD Oct 2 19:17:08.422000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.422000 audit: BPF prog-id=163 op=LOAD Oct 2 19:17:08.422000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003284f8 items=0 ppid=3492 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239396138663562633164383431626330613230373531646132643863 Oct 2 19:17:08.432012 env[1138]: time="2023-10-02T19:17:08.431984791Z" level=info msg="StartContainer for \"b99a8f5bc1d841bc0a20751da2d8c0b5b2b491fc73a43377d19f6813f99182cc\" returns successfully" Oct 2 19:17:08.572593 env[1138]: time="2023-10-02T19:17:08.572523012Z" level=info msg="StopPodSandbox for \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\"" Oct 2 19:17:08.573152 env[1138]: time="2023-10-02T19:17:08.573133717Z" level=info msg="StopPodSandbox for \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\"" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.610 [INFO][3634] k8s.go 576: Cleaning up netns ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.610 [INFO][3634] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" iface="eth0" netns="/var/run/netns/cni-65380a56-08b5-5d1d-f19c-189145f95c45" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.610 [INFO][3634] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" iface="eth0" netns="/var/run/netns/cni-65380a56-08b5-5d1d-f19c-189145f95c45" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.610 [INFO][3634] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" iface="eth0" netns="/var/run/netns/cni-65380a56-08b5-5d1d-f19c-189145f95c45" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.610 [INFO][3634] k8s.go 583: Releasing IP address(es) ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.610 [INFO][3634] utils.go 196: Calico CNI releasing IP address ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.633 [INFO][3649] ipam_plugin.go 416: Releasing address using handleID ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.642200 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:08.642200 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.638 [WARNING][3649] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.638 [INFO][3649] ipam_plugin.go 444: Releasing address using workloadID ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.642200 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:08.642200 env[1138]: 2023-10-02 19:17:08.640 [INFO][3634] k8s.go 589: Teardown processing complete. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:08.644803 env[1138]: time="2023-10-02T19:17:08.644759193Z" level=info msg="TearDown network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\" successfully" Oct 2 19:17:08.644803 env[1138]: time="2023-10-02T19:17:08.644784893Z" level=info msg="StopPodSandbox for \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\" returns successfully" Oct 2 19:17:08.645361 env[1138]: time="2023-10-02T19:17:08.645318172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s9jtb,Uid:a749925a-c070-43fd-ae04-bc4172f6bc97,Namespace:calico-system,Attempt:1,}" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.624 [INFO][3641] k8s.go 576: Cleaning up netns ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.624 [INFO][3641] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" iface="eth0" netns="/var/run/netns/cni-139f941c-ddda-9842-bf1c-6fb82424316b" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.625 [INFO][3641] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" iface="eth0" netns="/var/run/netns/cni-139f941c-ddda-9842-bf1c-6fb82424316b" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.625 [INFO][3641] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" iface="eth0" netns="/var/run/netns/cni-139f941c-ddda-9842-bf1c-6fb82424316b" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.625 [INFO][3641] k8s.go 583: Releasing IP address(es) ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.625 [INFO][3641] utils.go 196: Calico CNI releasing IP address ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.656 [INFO][3655] ipam_plugin.go 416: Releasing address using handleID ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.663841 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:08.663841 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.660 [WARNING][3655] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.661 [INFO][3655] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.663841 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:08.663841 env[1138]: 2023-10-02 19:17:08.662 [INFO][3641] k8s.go 589: Teardown processing complete. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:08.664154 env[1138]: time="2023-10-02T19:17:08.663945930Z" level=info msg="TearDown network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\" successfully" Oct 2 19:17:08.664154 env[1138]: time="2023-10-02T19:17:08.663963789Z" level=info msg="StopPodSandbox for \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\" returns successfully" Oct 2 19:17:08.664331 env[1138]: time="2023-10-02T19:17:08.664314183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-pbjk9,Uid:49e87e13-20e9-4288-a372-3be6bed3a306,Namespace:kube-system,Attempt:1,}" Oct 2 19:17:08.760000 audit[3702]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=3702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:08.760000 audit[3702]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc8a6fef00 a2=0 a3=7ffc8a6feeec items=0 ppid=2256 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:08.761000 audit[3702]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:08.761000 audit[3702]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffc8a6fef00 a2=0 a3=31030 items=0 ppid=2256 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:08.771636 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7eaf9b77810: link becomes ready Oct 2 19:17:08.777650 systemd-networkd[1052]: cali7eaf9b77810: Link UP Oct 2 19:17:08.777654 systemd-networkd[1052]: cali7eaf9b77810: Gained carrier Oct 2 19:17:08.794156 kubelet[2123]: I1002 19:17:08.793879 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-zkt8b" podStartSLOduration=29.793852779 podCreationTimestamp="2023-10-02 19:16:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:17:08.702236448 +0000 UTC m=+44.218610114" watchObservedRunningTime="2023-10-02 19:17:08.793852779 +0000 UTC m=+44.310226451" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.697 [INFO][3662] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--s9jtb-eth0 csi-node-driver- calico-system a749925a-c070-43fd-ae04-bc4172f6bc97 705 0 2023-10-02 19:16:55 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-s9jtb eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7eaf9b77810 [] []}} ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Namespace="calico-system" Pod="csi-node-driver-s9jtb" WorkloadEndpoint="localhost-k8s-csi--node--driver--s9jtb-" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.698 [INFO][3662] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Namespace="calico-system" Pod="csi-node-driver-s9jtb" WorkloadEndpoint="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.737 [INFO][3689] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" HandleID="k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.743 [INFO][3689] ipam_plugin.go 269: Auto assigning IP ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" HandleID="k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004de80), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-s9jtb", "timestamp":"2023-10-02 19:17:08.737392618 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:17:08.795577 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:08.795577 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.743 [INFO][3689] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.744 [INFO][3689] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" host="localhost" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.750 [INFO][3689] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.753 [INFO][3689] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.755 [INFO][3689] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.758 [INFO][3689] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.758 [INFO][3689] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" host="localhost" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.762 [INFO][3689] ipam.go 1682: Creating new handle: k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.764 [INFO][3689] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" host="localhost" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.767 [INFO][3689] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" host="localhost" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.768 [INFO][3689] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" host="localhost" Oct 2 19:17:08.795577 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:08.795577 env[1138]: 2023-10-02 19:17:08.768 [INFO][3689] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" HandleID="k8s-pod-network.1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.796019 env[1138]: 2023-10-02 19:17:08.769 [INFO][3662] k8s.go 383: Populated endpoint ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Namespace="calico-system" Pod="csi-node-driver-s9jtb" WorkloadEndpoint="localhost-k8s-csi--node--driver--s9jtb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--s9jtb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a749925a-c070-43fd-ae04-bc4172f6bc97", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-s9jtb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7eaf9b77810", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:08.796019 env[1138]: 2023-10-02 19:17:08.769 [INFO][3662] k8s.go 384: Calico CNI using IPs: [192.168.88.131/32] ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Namespace="calico-system" Pod="csi-node-driver-s9jtb" WorkloadEndpoint="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.796019 env[1138]: 2023-10-02 19:17:08.769 [INFO][3662] dataplane_linux.go 68: Setting the host side veth name to cali7eaf9b77810 ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Namespace="calico-system" Pod="csi-node-driver-s9jtb" WorkloadEndpoint="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.796019 env[1138]: 2023-10-02 19:17:08.771 [INFO][3662] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Namespace="calico-system" Pod="csi-node-driver-s9jtb" WorkloadEndpoint="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.796019 env[1138]: 2023-10-02 19:17:08.782 [INFO][3662] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Namespace="calico-system" Pod="csi-node-driver-s9jtb" WorkloadEndpoint="localhost-k8s-csi--node--driver--s9jtb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--s9jtb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a749925a-c070-43fd-ae04-bc4172f6bc97", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc", Pod:"csi-node-driver-s9jtb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7eaf9b77810", MAC:"b2:fb:bb:2d:4e:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:08.796019 env[1138]: 2023-10-02 19:17:08.794 [INFO][3662] k8s.go 489: Wrote updated endpoint to datastore ContainerID="1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc" Namespace="calico-system" Pod="csi-node-driver-s9jtb" WorkloadEndpoint="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:08.804981 env[1138]: time="2023-10-02T19:17:08.804945458Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:08.805103 env[1138]: time="2023-10-02T19:17:08.805082732Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:08.805160 env[1138]: time="2023-10-02T19:17:08.805147734Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:08.806803 env[1138]: time="2023-10-02T19:17:08.805300367Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc pid=3724 runtime=io.containerd.runc.v2 Oct 2 19:17:08.818138 systemd[1]: Started cri-containerd-1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc.scope. Oct 2 19:17:08.830000 audit[3749]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:08.830000 audit[3749]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffccee91f50 a2=0 a3=7ffccee91f3c items=0 ppid=3132 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.830000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:08.835600 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf131a1c859: link becomes ready Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.838000 audit: BPF prog-id=164 op=LOAD Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3724 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376464323435626263333931636566303863363764323961366637 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3724 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376464323435626263333931636566303863363764323961366637 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit: BPF prog-id=165 op=LOAD Oct 2 19:17:08.839000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000202810 items=0 ppid=3724 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376464323435626263333931636566303863363764323961366637 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit: BPF prog-id=166 op=LOAD Oct 2 19:17:08.839000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000202858 items=0 ppid=3724 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376464323435626263333931636566303863363764323961366637 Oct 2 19:17:08.839000 audit: BPF prog-id=166 op=UNLOAD Oct 2 19:17:08.839000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.841180 systemd-networkd[1052]: califf131a1c859: Link UP Oct 2 19:17:08.841182 systemd-networkd[1052]: califf131a1c859: Gained carrier Oct 2 19:17:08.839000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.839000 audit: BPF prog-id=167 op=LOAD Oct 2 19:17:08.839000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000202c68 items=0 ppid=3724 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376464323435626263333931636566303863363764323961366637 Oct 2 19:17:08.843143 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.720 [INFO][3672] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--pbjk9-eth0 coredns-5dd5756b68- kube-system 49e87e13-20e9-4288-a372-3be6bed3a306 706 0 2023-10-02 19:16:39 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-pbjk9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califf131a1c859 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Namespace="kube-system" Pod="coredns-5dd5756b68-pbjk9" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--pbjk9-" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.720 [INFO][3672] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Namespace="kube-system" Pod="coredns-5dd5756b68-pbjk9" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.780 [INFO][3695] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" HandleID="k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.795 [INFO][3695] ipam_plugin.go 269: Auto assigning IP ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" HandleID="k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00052c6e0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-pbjk9", "timestamp":"2023-10-02 19:17:08.780138115 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:17:08.854025 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:08.854025 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.795 [INFO][3695] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.797 [INFO][3695] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" host="localhost" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.801 [INFO][3695] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.811 [INFO][3695] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.814 [INFO][3695] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.816 [INFO][3695] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.816 [INFO][3695] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" host="localhost" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.817 [INFO][3695] ipam.go 1682: Creating new handle: k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224 Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.824 [INFO][3695] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" host="localhost" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.831 [INFO][3695] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" host="localhost" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.831 [INFO][3695] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" host="localhost" Oct 2 19:17:08.854025 env[1138]: time="2023-10-02T19:17:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:08.854025 env[1138]: 2023-10-02 19:17:08.831 [INFO][3695] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" HandleID="k8s-pod-network.61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.854470 env[1138]: 2023-10-02 19:17:08.832 [INFO][3672] k8s.go 383: Populated endpoint ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Namespace="kube-system" Pod="coredns-5dd5756b68-pbjk9" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--pbjk9-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"49e87e13-20e9-4288-a372-3be6bed3a306", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-pbjk9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califf131a1c859", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:08.854470 env[1138]: 2023-10-02 19:17:08.832 [INFO][3672] k8s.go 384: Calico CNI using IPs: [192.168.88.132/32] ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Namespace="kube-system" Pod="coredns-5dd5756b68-pbjk9" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.854470 env[1138]: 2023-10-02 19:17:08.833 [INFO][3672] dataplane_linux.go 68: Setting the host side veth name to califf131a1c859 ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Namespace="kube-system" Pod="coredns-5dd5756b68-pbjk9" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.854470 env[1138]: 2023-10-02 19:17:08.835 [INFO][3672] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Namespace="kube-system" Pod="coredns-5dd5756b68-pbjk9" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.854470 env[1138]: 2023-10-02 19:17:08.841 [INFO][3672] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Namespace="kube-system" Pod="coredns-5dd5756b68-pbjk9" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--pbjk9-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"49e87e13-20e9-4288-a372-3be6bed3a306", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224", Pod:"coredns-5dd5756b68-pbjk9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califf131a1c859", MAC:"22:72:33:97:ee:b9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:08.854470 env[1138]: 2023-10-02 19:17:08.846 [INFO][3672] k8s.go 489: Wrote updated endpoint to datastore ContainerID="61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224" Namespace="kube-system" Pod="coredns-5dd5756b68-pbjk9" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:08.862298 env[1138]: time="2023-10-02T19:17:08.862251705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s9jtb,Uid:a749925a-c070-43fd-ae04-bc4172f6bc97,Namespace:calico-system,Attempt:1,} returns sandbox id \"1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc\"" Oct 2 19:17:08.863768 env[1138]: time="2023-10-02T19:17:08.863725064Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:08.863828 env[1138]: time="2023-10-02T19:17:08.863770843Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:08.865689 env[1138]: time="2023-10-02T19:17:08.863787689Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:08.865871 env[1138]: time="2023-10-02T19:17:08.865837052Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224 pid=3782 runtime=io.containerd.runc.v2 Oct 2 19:17:08.868000 audit[3792]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3792 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:08.868000 audit[3792]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffce0c7c440 a2=0 a3=7ffce0c7c42c items=0 ppid=3132 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.868000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:08.873795 systemd[1]: Started cri-containerd-61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224.scope. Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.883000 audit: BPF prog-id=168 op=LOAD Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3782 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646432383665303939633037393037343463343366323330313037 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3782 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646432383665303939633037393037343463343366323330313037 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit: BPF prog-id=169 op=LOAD Oct 2 19:17:08.884000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000098ff0 items=0 ppid=3782 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646432383665303939633037393037343463343366323330313037 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit: BPF prog-id=170 op=LOAD Oct 2 19:17:08.884000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000099038 items=0 ppid=3782 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646432383665303939633037393037343463343366323330313037 Oct 2 19:17:08.884000 audit: BPF prog-id=170 op=UNLOAD Oct 2 19:17:08.884000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.884000 audit: BPF prog-id=171 op=LOAD Oct 2 19:17:08.884000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000099448 items=0 ppid=3782 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646432383665303939633037393037343463343366323330313037 Oct 2 19:17:08.886087 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:17:08.905913 env[1138]: time="2023-10-02T19:17:08.905842073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-pbjk9,Uid:49e87e13-20e9-4288-a372-3be6bed3a306,Namespace:kube-system,Attempt:1,} returns sandbox id \"61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224\"" Oct 2 19:17:08.913892 env[1138]: time="2023-10-02T19:17:08.913865843Z" level=info msg="CreateContainer within sandbox \"61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:17:08.919145 env[1138]: time="2023-10-02T19:17:08.919118347Z" level=info msg="CreateContainer within sandbox \"61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8ae2efc441aba68c152a864b14bf1e00c102ca9696fe925e1285584304d81b97\"" Oct 2 19:17:08.919554 env[1138]: time="2023-10-02T19:17:08.919532669Z" level=info msg="StartContainer for \"8ae2efc441aba68c152a864b14bf1e00c102ca9696fe925e1285584304d81b97\"" Oct 2 19:17:08.933560 systemd[1]: Started cri-containerd-8ae2efc441aba68c152a864b14bf1e00c102ca9696fe925e1285584304d81b97.scope. Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit: BPF prog-id=172 op=LOAD Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3782 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653265666334343161626136386331353261383634623134626631 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3782 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653265666334343161626136386331353261383634623134626631 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.943000 audit: BPF prog-id=173 op=LOAD Oct 2 19:17:08.943000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218530 items=0 ppid=3782 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653265666334343161626136386331353261383634623134626631 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.944000 audit: BPF prog-id=174 op=LOAD Oct 2 19:17:08.944000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000218578 items=0 ppid=3782 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653265666334343161626136386331353261383634623134626631 Oct 2 19:17:08.945000 audit: BPF prog-id=174 op=UNLOAD Oct 2 19:17:08.945000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.945000 audit: BPF prog-id=175 op=LOAD Oct 2 19:17:08.945000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000218988 items=0 ppid=3782 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653265666334343161626136386331353261383634623134626631 Oct 2 19:17:08.955822 env[1138]: time="2023-10-02T19:17:08.955795500Z" level=info msg="StartContainer for \"8ae2efc441aba68c152a864b14bf1e00c102ca9696fe925e1285584304d81b97\" returns successfully" Oct 2 19:17:09.065324 systemd[1]: run-netns-cni\x2d65380a56\x2d08b5\x2d5d1d\x2df19c\x2d189145f95c45.mount: Deactivated successfully. Oct 2 19:17:09.065377 systemd[1]: run-netns-cni\x2d139f941c\x2dddda\x2d9842\x2dbf1c\x2d6fb82424316b.mount: Deactivated successfully. Oct 2 19:17:09.436669 systemd-networkd[1052]: calicfa0c5ef45d: Gained IPv6LL Oct 2 19:17:09.706683 kubelet[2123]: I1002 19:17:09.706450 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-pbjk9" podStartSLOduration=30.706428729 podCreationTimestamp="2023-10-02 19:16:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:17:09.706169418 +0000 UTC m=+45.222543082" watchObservedRunningTime="2023-10-02 19:17:09.706428729 +0000 UTC m=+45.222802400" Oct 2 19:17:09.731000 audit[3861]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=3861 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:09.731000 audit[3861]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff84e06100 a2=0 a3=7fff84e060ec items=0 ppid=2256 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:09.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:09.731000 audit[3861]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=3861 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:09.731000 audit[3861]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff84e06100 a2=0 a3=31030 items=0 ppid=2256 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:09.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:09.743000 audit[3863]: NETFILTER_CFG table=filter:110 family=2 entries=11 op=nft_register_rule pid=3863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:09.743000 audit[3863]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcc5a52880 a2=0 a3=7ffcc5a5286c items=0 ppid=2256 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:09.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:09.750000 audit[3863]: NETFILTER_CFG table=nat:111 family=2 entries=47 op=nft_register_chain pid=3863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:09.750000 audit[3863]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffcc5a52880 a2=0 a3=7ffcc5a5286c items=0 ppid=2256 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:09.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:09.884645 systemd-networkd[1052]: cali17b7e7d9212: Gained IPv6LL Oct 2 19:17:10.268725 systemd-networkd[1052]: cali7eaf9b77810: Gained IPv6LL Oct 2 19:17:10.524684 systemd-networkd[1052]: califf131a1c859: Gained IPv6LL Oct 2 19:17:11.020312 env[1138]: time="2023-10-02T19:17:11.020277108Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:11.021230 env[1138]: time="2023-10-02T19:17:11.021217866Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:11.022334 env[1138]: time="2023-10-02T19:17:11.022321989Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:11.023344 env[1138]: time="2023-10-02T19:17:11.023326237Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:11.023955 env[1138]: time="2023-10-02T19:17:11.023940671Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:17:11.024635 env[1138]: time="2023-10-02T19:17:11.024617575Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:17:11.026700 env[1138]: time="2023-10-02T19:17:11.026685058Z" level=info msg="CreateContainer within sandbox \"3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:17:11.033067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount898444234.mount: Deactivated successfully. Oct 2 19:17:11.037042 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2203578707.mount: Deactivated successfully. Oct 2 19:17:11.046660 env[1138]: time="2023-10-02T19:17:11.046615917Z" level=info msg="CreateContainer within sandbox \"3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af\"" Oct 2 19:17:11.047477 env[1138]: time="2023-10-02T19:17:11.047218717Z" level=info msg="StartContainer for \"75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af\"" Oct 2 19:17:11.067053 systemd[1]: Started cri-containerd-75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af.scope. Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit: BPF prog-id=176 op=LOAD Oct 2 19:17:11.078000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3524 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:11.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343136636462303464303436303965353034623163613263633764 Oct 2 19:17:11.078000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.078000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3524 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:11.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343136636462303464303436303965353034623163613263633764 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit: BPF prog-id=177 op=LOAD Oct 2 19:17:11.079000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003340a0 items=0 ppid=3524 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:11.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343136636462303464303436303965353034623163613263633764 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit: BPF prog-id=178 op=LOAD Oct 2 19:17:11.079000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003340e8 items=0 ppid=3524 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:11.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343136636462303464303436303965353034623163613263633764 Oct 2 19:17:11.079000 audit: BPF prog-id=178 op=UNLOAD Oct 2 19:17:11.079000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:11.079000 audit: BPF prog-id=179 op=LOAD Oct 2 19:17:11.079000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003344f8 items=0 ppid=3524 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:11.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343136636462303464303436303965353034623163613263633764 Oct 2 19:17:11.095965 env[1138]: time="2023-10-02T19:17:11.095934259Z" level=info msg="StartContainer for \"75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af\" returns successfully" Oct 2 19:17:11.250240 env[1138]: time="2023-10-02T19:17:11.250204329Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:11.250531 env[1138]: time="2023-10-02T19:17:11.250507061Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:11.251713 kubelet[2123]: E1002 19:17:11.251626 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:11.251713 kubelet[2123]: E1002 19:17:11.251656 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:11.255572 kubelet[2123]: E1002 19:17:11.254871 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-l8hvd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-s9jtb_calico-system(a749925a-c070-43fd-ae04-bc4172f6bc97): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:11.256197 env[1138]: time="2023-10-02T19:17:11.256175461Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:17:11.490525 env[1138]: time="2023-10-02T19:17:11.490484813Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:11.490817 env[1138]: time="2023-10-02T19:17:11.490793830Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:11.490960 kubelet[2123]: E1002 19:17:11.490941 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:11.491000 kubelet[2123]: E1002 19:17:11.490965 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:11.491022 kubelet[2123]: E1002 19:17:11.491019 2123 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-l8hvd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-s9jtb_calico-system(a749925a-c070-43fd-ae04-bc4172f6bc97): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:11.491556 kubelet[2123]: E1002 19:17:11.491531 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-s9jtb" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" Oct 2 19:17:11.702566 kubelet[2123]: E1002 19:17:11.702539 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-s9jtb" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" Oct 2 19:17:11.721265 kubelet[2123]: I1002 19:17:11.721241 2123 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b9887bb6-z45qb" podStartSLOduration=26.051042326 podCreationTimestamp="2023-10-02 19:16:43 +0000 UTC" firstStartedPulling="2023-10-02 19:17:08.354078992 +0000 UTC m=+43.870452652" lastFinishedPulling="2023-10-02 19:17:11.024244561 +0000 UTC m=+46.540618224" observedRunningTime="2023-10-02 19:17:11.710101562 +0000 UTC m=+47.226475233" watchObservedRunningTime="2023-10-02 19:17:11.721207898 +0000 UTC m=+47.237581573" Oct 2 19:17:13.274355 kubelet[2123]: I1002 19:17:13.274331 2123 topology_manager.go:215] "Topology Admit Handler" podUID="eefae4e2-4b80-4bdf-ae03-3570f94585da" podNamespace="calico-apiserver" podName="calico-apiserver-6bfffd4bc9-9hhs5" Oct 2 19:17:13.279325 kernel: kauditd_printk_skb: 416 callbacks suppressed Oct 2 19:17:13.279411 kernel: audit: type=1325 audit(1696274233.274:1313): table=filter:112 family=2 entries=9 op=nft_register_rule pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:13.274000 audit[3931]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:13.279492 kubelet[2123]: I1002 19:17:13.277935 2123 topology_manager.go:215] "Topology Admit Handler" podUID="d2dae848-533d-46eb-9140-9a656cc80427" podNamespace="calico-apiserver" podName="calico-apiserver-6bfffd4bc9-pjmrw" Oct 2 19:17:13.274000 audit[3931]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc4599f7e0 a2=0 a3=7ffc4599f7cc items=0 ppid=2256 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.283589 kernel: audit: type=1300 audit(1696274233.274:1313): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc4599f7e0 a2=0 a3=7ffc4599f7cc items=0 ppid=2256 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:13.293556 kernel: audit: type=1327 audit(1696274233.274:1313): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:13.295165 systemd[1]: Created slice kubepods-besteffort-podd2dae848_533d_46eb_9140_9a656cc80427.slice. Oct 2 19:17:13.295000 audit[3931]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:13.298991 kernel: audit: type=1325 audit(1696274233.295:1314): table=nat:113 family=2 entries=20 op=nft_register_rule pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:13.302396 systemd[1]: Created slice kubepods-besteffort-podeefae4e2_4b80_4bdf_ae03_3570f94585da.slice. Oct 2 19:17:13.295000 audit[3931]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc4599f7e0 a2=0 a3=7ffc4599f7cc items=0 ppid=2256 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.309566 kernel: audit: type=1300 audit(1696274233.295:1314): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc4599f7e0 a2=0 a3=7ffc4599f7cc items=0 ppid=2256 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:13.312555 kernel: audit: type=1327 audit(1696274233.295:1314): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:13.315000 audit[3933]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=3933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:13.315000 audit[3933]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff183d2960 a2=0 a3=7fff183d294c items=0 ppid=2256 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.322230 kernel: audit: type=1325 audit(1696274233.315:1315): table=filter:114 family=2 entries=10 op=nft_register_rule pid=3933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:13.322281 kernel: audit: type=1300 audit(1696274233.315:1315): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff183d2960 a2=0 a3=7fff183d294c items=0 ppid=2256 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.322307 kernel: audit: type=1327 audit(1696274233.315:1315): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:13.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:13.315000 audit[3933]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=3933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:13.326060 kernel: audit: type=1325 audit(1696274233.315:1316): table=nat:115 family=2 entries=20 op=nft_register_rule pid=3933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:13.315000 audit[3933]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff183d2960 a2=0 a3=7fff183d294c items=0 ppid=2256 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:13.436697 kubelet[2123]: I1002 19:17:13.436671 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d2dae848-533d-46eb-9140-9a656cc80427-calico-apiserver-certs\") pod \"calico-apiserver-6bfffd4bc9-pjmrw\" (UID: \"d2dae848-533d-46eb-9140-9a656cc80427\") " pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" Oct 2 19:17:13.437153 kubelet[2123]: I1002 19:17:13.436723 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hj9lr\" (UniqueName: \"kubernetes.io/projected/d2dae848-533d-46eb-9140-9a656cc80427-kube-api-access-hj9lr\") pod \"calico-apiserver-6bfffd4bc9-pjmrw\" (UID: \"d2dae848-533d-46eb-9140-9a656cc80427\") " pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" Oct 2 19:17:13.437153 kubelet[2123]: I1002 19:17:13.436742 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/eefae4e2-4b80-4bdf-ae03-3570f94585da-calico-apiserver-certs\") pod \"calico-apiserver-6bfffd4bc9-9hhs5\" (UID: \"eefae4e2-4b80-4bdf-ae03-3570f94585da\") " pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" Oct 2 19:17:13.437153 kubelet[2123]: I1002 19:17:13.436758 2123 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wtqds\" (UniqueName: \"kubernetes.io/projected/eefae4e2-4b80-4bdf-ae03-3570f94585da-kube-api-access-wtqds\") pod \"calico-apiserver-6bfffd4bc9-9hhs5\" (UID: \"eefae4e2-4b80-4bdf-ae03-3570f94585da\") " pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" Oct 2 19:17:13.600711 env[1138]: time="2023-10-02T19:17:13.600673025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bfffd4bc9-pjmrw,Uid:d2dae848-533d-46eb-9140-9a656cc80427,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:17:13.606846 env[1138]: time="2023-10-02T19:17:13.606815279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bfffd4bc9-9hhs5,Uid:eefae4e2-4b80-4bdf-ae03-3570f94585da,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:17:13.695747 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:17:13.695826 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali03d9dca974e: link becomes ready Oct 2 19:17:13.702011 systemd-networkd[1052]: cali03d9dca974e: Link UP Oct 2 19:17:13.702015 systemd-networkd[1052]: cali03d9dca974e: Gained carrier Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.631 [INFO][3939] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0 calico-apiserver-6bfffd4bc9- calico-apiserver d2dae848-533d-46eb-9140-9a656cc80427 812 0 2023-10-02 19:17:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bfffd4bc9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6bfffd4bc9-pjmrw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali03d9dca974e [] []}} ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-pjmrw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.631 [INFO][3939] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-pjmrw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.660 [INFO][3962] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" HandleID="k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Workload="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.671 [INFO][3962] ipam_plugin.go 269: Auto assigning IP ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" HandleID="k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Workload="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004dfb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6bfffd4bc9-pjmrw", "timestamp":"2023-10-02 19:17:13.660639921 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:17:13.720354 env[1138]: time="2023-10-02T19:17:13Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:13.720354 env[1138]: time="2023-10-02T19:17:13Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.671 [INFO][3962] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.674 [INFO][3962] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" host="localhost" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.678 [INFO][3962] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.680 [INFO][3962] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.681 [INFO][3962] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.682 [INFO][3962] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.682 [INFO][3962] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" host="localhost" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.684 [INFO][3962] ipam.go 1682: Creating new handle: k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90 Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.688 [INFO][3962] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" host="localhost" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.690 [INFO][3962] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" host="localhost" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.691 [INFO][3962] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" host="localhost" Oct 2 19:17:13.720354 env[1138]: time="2023-10-02T19:17:13Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:13.720354 env[1138]: 2023-10-02 19:17:13.691 [INFO][3962] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" HandleID="k8s-pod-network.9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Workload="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" Oct 2 19:17:13.721461 env[1138]: 2023-10-02 19:17:13.693 [INFO][3939] k8s.go 383: Populated endpoint ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-pjmrw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0", GenerateName:"calico-apiserver-6bfffd4bc9-", Namespace:"calico-apiserver", SelfLink:"", UID:"d2dae848-533d-46eb-9140-9a656cc80427", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bfffd4bc9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6bfffd4bc9-pjmrw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali03d9dca974e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:13.721461 env[1138]: 2023-10-02 19:17:13.693 [INFO][3939] k8s.go 384: Calico CNI using IPs: [192.168.88.133/32] ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-pjmrw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" Oct 2 19:17:13.721461 env[1138]: 2023-10-02 19:17:13.693 [INFO][3939] dataplane_linux.go 68: Setting the host side veth name to cali03d9dca974e ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-pjmrw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" Oct 2 19:17:13.721461 env[1138]: 2023-10-02 19:17:13.695 [INFO][3939] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-pjmrw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" Oct 2 19:17:13.721461 env[1138]: 2023-10-02 19:17:13.702 [INFO][3939] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-pjmrw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0", GenerateName:"calico-apiserver-6bfffd4bc9-", Namespace:"calico-apiserver", SelfLink:"", UID:"d2dae848-533d-46eb-9140-9a656cc80427", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bfffd4bc9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90", Pod:"calico-apiserver-6bfffd4bc9-pjmrw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali03d9dca974e", MAC:"5a:b5:a8:a0:77:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:13.721461 env[1138]: 2023-10-02 19:17:13.718 [INFO][3939] k8s.go 489: Wrote updated endpoint to datastore ContainerID="9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-pjmrw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--pjmrw-eth0" Oct 2 19:17:13.730569 systemd-networkd[1052]: calid504cbda687: Link UP Oct 2 19:17:13.730802 systemd-networkd[1052]: calid504cbda687: Gained carrier Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.647 [INFO][3950] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0 calico-apiserver-6bfffd4bc9- calico-apiserver eefae4e2-4b80-4bdf-ae03-3570f94585da 810 0 2023-10-02 19:17:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bfffd4bc9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6bfffd4bc9-9hhs5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid504cbda687 [] []}} ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-9hhs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.648 [INFO][3950] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-9hhs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.676 [INFO][3968] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" HandleID="k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Workload="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.683 [INFO][3968] ipam_plugin.go 269: Auto assigning IP ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" HandleID="k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Workload="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a710), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6bfffd4bc9-9hhs5", "timestamp":"2023-10-02 19:17:13.676380099 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:17:13.735884 env[1138]: time="2023-10-02T19:17:13Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:13.735884 env[1138]: time="2023-10-02T19:17:13Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.691 [INFO][3968] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.694 [INFO][3968] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" host="localhost" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.696 [INFO][3968] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.698 [INFO][3968] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.699 [INFO][3968] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.704 [INFO][3968] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.704 [INFO][3968] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" host="localhost" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.706 [INFO][3968] ipam.go 1682: Creating new handle: k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18 Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.708 [INFO][3968] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" host="localhost" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.713 [INFO][3968] ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" host="localhost" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.713 [INFO][3968] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" host="localhost" Oct 2 19:17:13.735884 env[1138]: time="2023-10-02T19:17:13Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:13.735884 env[1138]: 2023-10-02 19:17:13.716 [INFO][3968] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" HandleID="k8s-pod-network.89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Workload="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" Oct 2 19:17:13.737563 env[1138]: 2023-10-02 19:17:13.724 [INFO][3950] k8s.go 383: Populated endpoint ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-9hhs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0", GenerateName:"calico-apiserver-6bfffd4bc9-", Namespace:"calico-apiserver", SelfLink:"", UID:"eefae4e2-4b80-4bdf-ae03-3570f94585da", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bfffd4bc9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6bfffd4bc9-9hhs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid504cbda687", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:13.737563 env[1138]: 2023-10-02 19:17:13.724 [INFO][3950] k8s.go 384: Calico CNI using IPs: [192.168.88.134/32] ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-9hhs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" Oct 2 19:17:13.737563 env[1138]: 2023-10-02 19:17:13.725 [INFO][3950] dataplane_linux.go 68: Setting the host side veth name to calid504cbda687 ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-9hhs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" Oct 2 19:17:13.737563 env[1138]: 2023-10-02 19:17:13.725 [INFO][3950] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-9hhs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" Oct 2 19:17:13.737563 env[1138]: 2023-10-02 19:17:13.729 [INFO][3950] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-9hhs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0", GenerateName:"calico-apiserver-6bfffd4bc9-", Namespace:"calico-apiserver", SelfLink:"", UID:"eefae4e2-4b80-4bdf-ae03-3570f94585da", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bfffd4bc9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18", Pod:"calico-apiserver-6bfffd4bc9-9hhs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid504cbda687", MAC:"56:b4:31:50:fb:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:13.737563 env[1138]: 2023-10-02 19:17:13.734 [INFO][3950] k8s.go 489: Wrote updated endpoint to datastore ContainerID="89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18" Namespace="calico-apiserver" Pod="calico-apiserver-6bfffd4bc9-9hhs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bfffd4bc9--9hhs5-eth0" Oct 2 19:17:13.752797 env[1138]: time="2023-10-02T19:17:13.750835764Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:13.752797 env[1138]: time="2023-10-02T19:17:13.750886113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:13.752797 env[1138]: time="2023-10-02T19:17:13.750897841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:13.752797 env[1138]: time="2023-10-02T19:17:13.750977501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90 pid=4004 runtime=io.containerd.runc.v2 Oct 2 19:17:13.758000 audit[4038]: NETFILTER_CFG table=filter:116 family=2 entries=59 op=nft_register_chain pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:13.758000 audit[4038]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffd2c5f5b30 a2=0 a3=7ffd2c5f5b1c items=0 ppid=3132 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.758000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:13.761060 env[1138]: time="2023-10-02T19:17:13.761005880Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:13.761060 env[1138]: time="2023-10-02T19:17:13.761041998Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:13.761235 env[1138]: time="2023-10-02T19:17:13.761204522Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:13.761427 env[1138]: time="2023-10-02T19:17:13.761404430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18 pid=4029 runtime=io.containerd.runc.v2 Oct 2 19:17:13.785257 systemd[1]: Started cri-containerd-9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90.scope. Oct 2 19:17:13.791707 systemd[1]: Started cri-containerd-89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18.scope. Oct 2 19:17:13.793000 audit[4044]: NETFILTER_CFG table=filter:117 family=2 entries=50 op=nft_register_chain pid=4044 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:13.793000 audit[4044]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7fffa44fa240 a2=0 a3=7fffa44fa22c items=0 ppid=3132 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.793000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.809000 audit: BPF prog-id=180 op=LOAD Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4004 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932313062383339353934336436346333636332613130626363306230 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4004 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932313062383339353934336436346333636332613130626363306230 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit: BPF prog-id=181 op=LOAD Oct 2 19:17:13.810000 audit[4037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000092810 items=0 ppid=4004 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932313062383339353934336436346333636332613130626363306230 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit: BPF prog-id=182 op=LOAD Oct 2 19:17:13.810000 audit[4037]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000092858 items=0 ppid=4004 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932313062383339353934336436346333636332613130626363306230 Oct 2 19:17:13.810000 audit: BPF prog-id=182 op=UNLOAD Oct 2 19:17:13.810000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.810000 audit: BPF prog-id=183 op=LOAD Oct 2 19:17:13.810000 audit[4037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000092c68 items=0 ppid=4004 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932313062383339353934336436346333636332613130626363306230 Oct 2 19:17:13.813198 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit: BPF prog-id=184 op=LOAD Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4029 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613635346530386666623066663062636333386366333532666334 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4029 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613635346530386666623066663062636333386366333532666334 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit: BPF prog-id=185 op=LOAD Oct 2 19:17:13.819000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001986b0 items=0 ppid=4029 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613635346530386666623066663062636333386366333532666334 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit: BPF prog-id=186 op=LOAD Oct 2 19:17:13.819000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001986f8 items=0 ppid=4029 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613635346530386666623066663062636333386366333532666334 Oct 2 19:17:13.819000 audit: BPF prog-id=186 op=UNLOAD Oct 2 19:17:13.819000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:13.819000 audit: BPF prog-id=187 op=LOAD Oct 2 19:17:13.819000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000198b08 items=0 ppid=4029 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:13.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613635346530386666623066663062636333386366333532666334 Oct 2 19:17:13.823393 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:17:13.853971 env[1138]: time="2023-10-02T19:17:13.850762191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bfffd4bc9-pjmrw,Uid:d2dae848-533d-46eb-9140-9a656cc80427,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"9210b8395943d64c3cc2a10bcc0b09250affe07b81c686f8e7912c0e41062d90\"" Oct 2 19:17:13.853971 env[1138]: time="2023-10-02T19:17:13.852674316Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:13.863621 env[1138]: time="2023-10-02T19:17:13.863593777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bfffd4bc9-9hhs5,Uid:eefae4e2-4b80-4bdf-ae03-3570f94585da,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"89a654e08ffb0ff0bcc38cf352fc4e4e0f92e36a9ecb562bb92026292a2b6a18\"" Oct 2 19:17:14.067135 env[1138]: time="2023-10-02T19:17:14.067102569Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:14.067525 env[1138]: time="2023-10-02T19:17:14.067507088Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:14.067771 kubelet[2123]: E1002 19:17:14.067755 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:14.067812 kubelet[2123]: E1002 19:17:14.067785 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:14.067935 kubelet[2123]: E1002 19:17:14.067922 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hj9lr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-6bfffd4bc9-pjmrw_calico-apiserver(d2dae848-533d-46eb-9140-9a656cc80427): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:14.068009 kubelet[2123]: E1002 19:17:14.067953 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" podUID="d2dae848-533d-46eb-9140-9a656cc80427" Oct 2 19:17:14.068208 env[1138]: time="2023-10-02T19:17:14.068197056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:14.315024 env[1138]: time="2023-10-02T19:17:14.314991576Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:14.315442 env[1138]: time="2023-10-02T19:17:14.315420831Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:14.315658 kubelet[2123]: E1002 19:17:14.315627 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:14.315836 kubelet[2123]: E1002 19:17:14.315670 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:14.315836 kubelet[2123]: E1002 19:17:14.315747 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wtqds,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-6bfffd4bc9-9hhs5_calico-apiserver(eefae4e2-4b80-4bdf-ae03-3570f94585da): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:14.315836 kubelet[2123]: E1002 19:17:14.315772 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" podUID="eefae4e2-4b80-4bdf-ae03-3570f94585da" Oct 2 19:17:14.708191 kubelet[2123]: E1002 19:17:14.708103 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" podUID="eefae4e2-4b80-4bdf-ae03-3570f94585da" Oct 2 19:17:14.709250 kubelet[2123]: E1002 19:17:14.709231 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" podUID="d2dae848-533d-46eb-9140-9a656cc80427" Oct 2 19:17:14.779000 audit[4112]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4112 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:14.779000 audit[4112]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcbf140070 a2=0 a3=7ffcbf14005c items=0 ppid=2256 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:14.779000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:14.780000 audit[4112]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4112 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:14.780000 audit[4112]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcbf140070 a2=0 a3=7ffcbf14005c items=0 ppid=2256 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:14.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:15.388678 systemd-networkd[1052]: cali03d9dca974e: Gained IPv6LL Oct 2 19:17:15.580626 systemd-networkd[1052]: calid504cbda687: Gained IPv6LL Oct 2 19:17:15.711328 kubelet[2123]: E1002 19:17:15.711255 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" podUID="eefae4e2-4b80-4bdf-ae03-3570f94585da" Oct 2 19:17:15.711632 kubelet[2123]: E1002 19:17:15.711477 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" podUID="d2dae848-533d-46eb-9140-9a656cc80427" Oct 2 19:17:15.790000 audit[4116]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:15.790000 audit[4116]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc1ca622c0 a2=0 a3=7ffc1ca622ac items=0 ppid=2256 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:15.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:15.791000 audit[4116]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:15.791000 audit[4116]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc1ca622c0 a2=0 a3=7ffc1ca622ac items=0 ppid=2256 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:15.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:21.014000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.016782 kernel: kauditd_printk_skb: 134 callbacks suppressed Oct 2 19:17:21.016828 kernel: audit: type=1400 audit(1696274241.014:1359): avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.014000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.022937 kernel: audit: type=1400 audit(1696274241.014:1360): avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.014000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000aa0660 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:17:21.026981 kernel: audit: type=1300 audit(1696274241.014:1360): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000aa0660 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:17:21.027022 kernel: audit: type=1327 audit(1696274241.014:1360): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:21.014000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:21.014000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b67680 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:17:21.034212 kernel: audit: type=1300 audit(1696274241.014:1359): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b67680 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:17:21.034269 kernel: audit: type=1327 audit(1696274241.014:1359): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:21.014000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:21.593000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.593000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00f6b3160 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:17:21.602786 kernel: audit: type=1400 audit(1696274241.593:1361): avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.602825 kernel: audit: type=1300 audit(1696274241.593:1361): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00f6b3160 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:17:21.593000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:17:21.607032 kernel: audit: type=1327 audit(1696274241.593:1361): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:17:21.594000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=4801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.610768 kernel: audit: type=1400 audit(1696274241.594:1362): avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=4801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.594000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00702cc00 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:17:21.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:17:21.595000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.595000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00702cc30 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:17:21.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:17:21.595000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=4807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.595000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00702cc90 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:17:21.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:17:21.601000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=4805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.601000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0066cbfb0 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:17:21.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:17:21.601000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:21.601000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00f6b31e0 a2=fc6 a3=0 items=0 ppid=1861 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c824 key=(null) Oct 2 19:17:21.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:17:24.554213 env[1138]: time="2023-10-02T19:17:24.554179999Z" level=info msg="StopPodSandbox for \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\"" Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.591 [WARNING][4189] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"6abccd75-d298-43e6-9e81-26271a453c59", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933", Pod:"calico-kube-controllers-74b9887bb6-z45qb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicfa0c5ef45d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.591 [INFO][4189] k8s.go 576: Cleaning up netns ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.591 [INFO][4189] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" iface="eth0" netns="" Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.591 [INFO][4189] k8s.go 583: Releasing IP address(es) ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.591 [INFO][4189] utils.go 196: Calico CNI releasing IP address ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.609 [INFO][4197] ipam_plugin.go 416: Releasing address using handleID ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:24.618099 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:24.618099 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.614 [WARNING][4197] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.614 [INFO][4197] ipam_plugin.go 444: Releasing address using workloadID ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:24.618099 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:24.618099 env[1138]: 2023-10-02 19:17:24.616 [INFO][4189] k8s.go 589: Teardown processing complete. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:24.618508 env[1138]: time="2023-10-02T19:17:24.618488153Z" level=info msg="TearDown network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\" successfully" Oct 2 19:17:24.618584 env[1138]: time="2023-10-02T19:17:24.618573009Z" level=info msg="StopPodSandbox for \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\" returns successfully" Oct 2 19:17:24.619487 env[1138]: time="2023-10-02T19:17:24.619473898Z" level=info msg="RemovePodSandbox for \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\"" Oct 2 19:17:24.619583 env[1138]: time="2023-10-02T19:17:24.619558262Z" level=info msg="Forcibly stopping sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\"" Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.645 [WARNING][4215] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"6abccd75-d298-43e6-9e81-26271a453c59", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3398a05cf1d475554ee06b4c98196da94fd95a698b06e3ba35c3d16703da3933", Pod:"calico-kube-controllers-74b9887bb6-z45qb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicfa0c5ef45d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.645 [INFO][4215] k8s.go 576: Cleaning up netns ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.645 [INFO][4215] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" iface="eth0" netns="" Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.645 [INFO][4215] k8s.go 583: Releasing IP address(es) ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.645 [INFO][4215] utils.go 196: Calico CNI releasing IP address ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.659 [INFO][4221] ipam_plugin.go 416: Releasing address using handleID ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:24.665902 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:24.665902 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.663 [WARNING][4221] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.663 [INFO][4221] ipam_plugin.go 444: Releasing address using workloadID ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" HandleID="k8s-pod-network.973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--z45qb-eth0" Oct 2 19:17:24.665902 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:24.665902 env[1138]: 2023-10-02 19:17:24.664 [INFO][4215] k8s.go 589: Teardown processing complete. ContainerID="973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad" Oct 2 19:17:24.666234 env[1138]: time="2023-10-02T19:17:24.665926194Z" level=info msg="TearDown network for sandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\" successfully" Oct 2 19:17:24.667269 env[1138]: time="2023-10-02T19:17:24.667253080Z" level=info msg="RemovePodSandbox \"973c57ef610760d4b9bde748c94a9805986c3ab74b1aaebeef14627f44856dad\" returns successfully" Oct 2 19:17:24.667635 env[1138]: time="2023-10-02T19:17:24.667623070Z" level=info msg="StopPodSandbox for \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\"" Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.687 [WARNING][4239] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--zkt8b-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"4e54baa8-8caa-47db-b190-b92e0aa549a0", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10", Pod:"coredns-5dd5756b68-zkt8b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali17b7e7d9212", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.687 [INFO][4239] k8s.go 576: Cleaning up netns ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.687 [INFO][4239] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" iface="eth0" netns="" Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.687 [INFO][4239] k8s.go 583: Releasing IP address(es) ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.688 [INFO][4239] utils.go 196: Calico CNI releasing IP address ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.705 [INFO][4245] ipam_plugin.go 416: Releasing address using handleID ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:24.711288 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:24.711288 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.709 [WARNING][4245] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.709 [INFO][4245] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:24.711288 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:24.711288 env[1138]: 2023-10-02 19:17:24.710 [INFO][4239] k8s.go 589: Teardown processing complete. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:24.711764 env[1138]: time="2023-10-02T19:17:24.711304620Z" level=info msg="TearDown network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\" successfully" Oct 2 19:17:24.711764 env[1138]: time="2023-10-02T19:17:24.711330305Z" level=info msg="StopPodSandbox for \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\" returns successfully" Oct 2 19:17:24.711981 env[1138]: time="2023-10-02T19:17:24.711969011Z" level=info msg="RemovePodSandbox for \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\"" Oct 2 19:17:24.712064 env[1138]: time="2023-10-02T19:17:24.712039324Z" level=info msg="Forcibly stopping sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\"" Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.733 [WARNING][4263] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--zkt8b-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"4e54baa8-8caa-47db-b190-b92e0aa549a0", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d565b90b586d85560a2f83c4b753c25fdd133d6c853a75cb13290e8fdf07ef10", Pod:"coredns-5dd5756b68-zkt8b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali17b7e7d9212", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.733 [INFO][4263] k8s.go 576: Cleaning up netns ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.733 [INFO][4263] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" iface="eth0" netns="" Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.733 [INFO][4263] k8s.go 583: Releasing IP address(es) ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.733 [INFO][4263] utils.go 196: Calico CNI releasing IP address ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.754 [INFO][4269] ipam_plugin.go 416: Releasing address using handleID ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:24.760303 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:24.760303 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.758 [WARNING][4269] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.758 [INFO][4269] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" HandleID="k8s-pod-network.3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Workload="localhost-k8s-coredns--5dd5756b68--zkt8b-eth0" Oct 2 19:17:24.760303 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:24.760303 env[1138]: 2023-10-02 19:17:24.759 [INFO][4263] k8s.go 589: Teardown processing complete. ContainerID="3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb" Oct 2 19:17:24.761372 env[1138]: time="2023-10-02T19:17:24.760324997Z" level=info msg="TearDown network for sandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\" successfully" Oct 2 19:17:24.761680 env[1138]: time="2023-10-02T19:17:24.761664392Z" level=info msg="RemovePodSandbox \"3759fa0419e377c235c594502028404d783c87265c2ae04b1c77fc3ce16cd2cb\" returns successfully" Oct 2 19:17:24.761970 env[1138]: time="2023-10-02T19:17:24.761956341Z" level=info msg="StopPodSandbox for \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\"" Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.782 [WARNING][4288] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--s9jtb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a749925a-c070-43fd-ae04-bc4172f6bc97", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc", Pod:"csi-node-driver-s9jtb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7eaf9b77810", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.782 [INFO][4288] k8s.go 576: Cleaning up netns ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.782 [INFO][4288] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" iface="eth0" netns="" Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.782 [INFO][4288] k8s.go 583: Releasing IP address(es) ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.782 [INFO][4288] utils.go 196: Calico CNI releasing IP address ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.811 [INFO][4295] ipam_plugin.go 416: Releasing address using handleID ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:24.819064 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:24.819064 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.814 [WARNING][4295] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.814 [INFO][4295] ipam_plugin.go 444: Releasing address using workloadID ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:24.819064 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:24.819064 env[1138]: 2023-10-02 19:17:24.816 [INFO][4288] k8s.go 589: Teardown processing complete. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:24.819064 env[1138]: time="2023-10-02T19:17:24.817754520Z" level=info msg="TearDown network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\" successfully" Oct 2 19:17:24.819064 env[1138]: time="2023-10-02T19:17:24.817781095Z" level=info msg="StopPodSandbox for \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\" returns successfully" Oct 2 19:17:24.819064 env[1138]: time="2023-10-02T19:17:24.818080515Z" level=info msg="RemovePodSandbox for \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\"" Oct 2 19:17:24.819064 env[1138]: time="2023-10-02T19:17:24.818097852Z" level=info msg="Forcibly stopping sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\"" Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.839 [WARNING][4316] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--s9jtb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a749925a-c070-43fd-ae04-bc4172f6bc97", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1f7dd245bbc391cef08c67d29a6f7ce85ab518b85d91d057ac3e7ba0c83f4ccc", Pod:"csi-node-driver-s9jtb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7eaf9b77810", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.839 [INFO][4316] k8s.go 576: Cleaning up netns ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.839 [INFO][4316] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" iface="eth0" netns="" Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.839 [INFO][4316] k8s.go 583: Releasing IP address(es) ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.839 [INFO][4316] utils.go 196: Calico CNI releasing IP address ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.851 [INFO][4322] ipam_plugin.go 416: Releasing address using handleID ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:24.857530 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:24.857530 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.855 [WARNING][4322] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.855 [INFO][4322] ipam_plugin.go 444: Releasing address using workloadID ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" HandleID="k8s-pod-network.cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Workload="localhost-k8s-csi--node--driver--s9jtb-eth0" Oct 2 19:17:24.857530 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:24.857530 env[1138]: 2023-10-02 19:17:24.856 [INFO][4316] k8s.go 589: Teardown processing complete. ContainerID="cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb" Oct 2 19:17:24.858394 env[1138]: time="2023-10-02T19:17:24.857554596Z" level=info msg="TearDown network for sandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\" successfully" Oct 2 19:17:24.858781 env[1138]: time="2023-10-02T19:17:24.858766247Z" level=info msg="RemovePodSandbox \"cda255386fc55c957cb4c7f24d290385fd897729f88aff5edc270efce7b1f4fb\" returns successfully" Oct 2 19:17:24.859063 env[1138]: time="2023-10-02T19:17:24.859048125Z" level=info msg="StopPodSandbox for \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\"" Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.879 [WARNING][4341] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--pbjk9-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"49e87e13-20e9-4288-a372-3be6bed3a306", ResourceVersion:"727", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224", Pod:"coredns-5dd5756b68-pbjk9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califf131a1c859", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.880 [INFO][4341] k8s.go 576: Cleaning up netns ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.880 [INFO][4341] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" iface="eth0" netns="" Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.880 [INFO][4341] k8s.go 583: Releasing IP address(es) ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.880 [INFO][4341] utils.go 196: Calico CNI releasing IP address ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.894 [INFO][4347] ipam_plugin.go 416: Releasing address using handleID ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:24.900293 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:24.900293 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.897 [WARNING][4347] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.897 [INFO][4347] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:24.900293 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:24.900293 env[1138]: 2023-10-02 19:17:24.899 [INFO][4341] k8s.go 589: Teardown processing complete. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:24.900674 env[1138]: time="2023-10-02T19:17:24.900309567Z" level=info msg="TearDown network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\" successfully" Oct 2 19:17:24.900674 env[1138]: time="2023-10-02T19:17:24.900329412Z" level=info msg="StopPodSandbox for \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\" returns successfully" Oct 2 19:17:24.900674 env[1138]: time="2023-10-02T19:17:24.900588368Z" level=info msg="RemovePodSandbox for \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\"" Oct 2 19:17:24.900674 env[1138]: time="2023-10-02T19:17:24.900605354Z" level=info msg="Forcibly stopping sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\"" Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.926 [WARNING][4365] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--pbjk9-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"49e87e13-20e9-4288-a372-3be6bed3a306", ResourceVersion:"727", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61dd286e099c0790744c43f2301073234c7d2fc131c63df53bba45a48e469224", Pod:"coredns-5dd5756b68-pbjk9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califf131a1c859", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.927 [INFO][4365] k8s.go 576: Cleaning up netns ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.927 [INFO][4365] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" iface="eth0" netns="" Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.927 [INFO][4365] k8s.go 583: Releasing IP address(es) ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.927 [INFO][4365] utils.go 196: Calico CNI releasing IP address ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.939 [INFO][4371] ipam_plugin.go 416: Releasing address using handleID ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:24.946235 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:17:24.946235 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.943 [WARNING][4371] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.943 [INFO][4371] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" HandleID="k8s-pod-network.0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Workload="localhost-k8s-coredns--5dd5756b68--pbjk9-eth0" Oct 2 19:17:24.946235 env[1138]: time="2023-10-02T19:17:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:17:24.946235 env[1138]: 2023-10-02 19:17:24.945 [INFO][4365] k8s.go 589: Teardown processing complete. ContainerID="0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591" Oct 2 19:17:24.946581 env[1138]: time="2023-10-02T19:17:24.946252283Z" level=info msg="TearDown network for sandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\" successfully" Oct 2 19:17:24.947576 env[1138]: time="2023-10-02T19:17:24.947558796Z" level=info msg="RemovePodSandbox \"0021b4cc05397a9fa88a93f25abc27e6f9329cd46c2d1257444ca8da9d759591\" returns successfully" Oct 2 19:17:25.968000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.968000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.968000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b1d540 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:17:25.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.968000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000aa0ae0 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:17:25.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.968000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.968000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b1d5c0 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:17:25.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.968000 audit[1940]: AVC avc: denied { watch } for pid=1940 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=4790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.968000 audit[1940]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b1d600 a2=fc6 a3=0 items=0 ppid=1819 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c655 key=(null) Oct 2 19:17:25.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.998105 systemd[1]: run-containerd-runc-k8s.io-75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af-runc.6qqN64.mount: Deactivated successfully. Oct 2 19:17:26.572056 env[1138]: time="2023-10-02T19:17:26.572027075Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:26.827797 env[1138]: time="2023-10-02T19:17:26.827712433Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:26.828302 env[1138]: time="2023-10-02T19:17:26.828277421Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:26.828533 kubelet[2123]: E1002 19:17:26.828511 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:26.828814 kubelet[2123]: E1002 19:17:26.828803 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:26.829102 kubelet[2123]: E1002 19:17:26.829090 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hj9lr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-6bfffd4bc9-pjmrw_calico-apiserver(d2dae848-533d-46eb-9140-9a656cc80427): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:26.829254 kubelet[2123]: E1002 19:17:26.829244 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" podUID="d2dae848-533d-46eb-9140-9a656cc80427" Oct 2 19:17:26.829858 env[1138]: time="2023-10-02T19:17:26.829834785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:17:27.065369 env[1138]: time="2023-10-02T19:17:27.065326536Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:27.065859 env[1138]: time="2023-10-02T19:17:27.065820201Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:27.066121 kubelet[2123]: E1002 19:17:27.066104 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:27.066226 kubelet[2123]: E1002 19:17:27.066216 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:27.066381 kubelet[2123]: E1002 19:17:27.066371 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-l8hvd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-s9jtb_calico-system(a749925a-c070-43fd-ae04-bc4172f6bc97): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:27.067343 env[1138]: time="2023-10-02T19:17:27.067326093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:17:27.303595 env[1138]: time="2023-10-02T19:17:27.303524375Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:27.304028 env[1138]: time="2023-10-02T19:17:27.303990833Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:27.304239 kubelet[2123]: E1002 19:17:27.304225 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:27.304340 kubelet[2123]: E1002 19:17:27.304330 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:27.304490 kubelet[2123]: E1002 19:17:27.304479 2123 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-l8hvd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-s9jtb_calico-system(a749925a-c070-43fd-ae04-bc4172f6bc97): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:27.304697 kubelet[2123]: E1002 19:17:27.304686 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-s9jtb" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" Oct 2 19:17:29.572210 env[1138]: time="2023-10-02T19:17:29.572176026Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:29.916199 env[1138]: time="2023-10-02T19:17:29.916098679Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:29.916666 env[1138]: time="2023-10-02T19:17:29.916613735Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:29.916870 kubelet[2123]: E1002 19:17:29.916855 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:29.917121 kubelet[2123]: E1002 19:17:29.917110 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:29.917281 kubelet[2123]: E1002 19:17:29.917270 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wtqds,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-6bfffd4bc9-9hhs5_calico-apiserver(eefae4e2-4b80-4bdf-ae03-3570f94585da): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:29.917677 kubelet[2123]: E1002 19:17:29.917666 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" podUID="eefae4e2-4b80-4bdf-ae03-3570f94585da" Oct 2 19:17:39.572034 kubelet[2123]: E1002 19:17:39.571817 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" podUID="d2dae848-533d-46eb-9140-9a656cc80427" Oct 2 19:17:39.572856 kubelet[2123]: E1002 19:17:39.572550 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-s9jtb" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" Oct 2 19:17:39.901613 systemd[1]: Started sshd@7-139.178.70.108:22-86.109.11.97:52906.service. Oct 2 19:17:39.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-86.109.11.97:52906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:39.902913 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 2 19:17:39.902953 kernel: audit: type=1130 audit(1696274259.900:1371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-86.109.11.97:52906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:39.975000 audit[4499]: USER_ACCT pid=4499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:39.977952 sshd[4499]: Accepted publickey for core from 86.109.11.97 port 52906 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:17:39.982608 kernel: audit: type=1101 audit(1696274259.975:1372): pid=4499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:39.981000 audit[4499]: CRED_ACQ pid=4499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:39.984300 sshd[4499]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:17:39.989438 kernel: audit: type=1103 audit(1696274259.981:1373): pid=4499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:39.989477 kernel: audit: type=1006 audit(1696274259.981:1374): pid=4499 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:17:39.981000 audit[4499]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6ed6d1f0 a2=3 a3=0 items=0 ppid=1 pid=4499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:39.993418 kernel: audit: type=1300 audit(1696274259.981:1374): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6ed6d1f0 a2=3 a3=0 items=0 ppid=1 pid=4499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:39.981000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:17:39.994720 kernel: audit: type=1327 audit(1696274259.981:1374): proctitle=737368643A20636F7265205B707269765D Oct 2 19:17:39.997707 systemd-logind[1131]: New session 10 of user core. Oct 2 19:17:39.998324 systemd[1]: Started session-10.scope. Oct 2 19:17:40.003000 audit[4499]: USER_START pid=4499 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:40.010563 kernel: audit: type=1105 audit(1696274260.003:1375): pid=4499 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:40.010651 kernel: audit: type=1103 audit(1696274260.008:1376): pid=4506 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:40.008000 audit[4506]: CRED_ACQ pid=4506 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:40.569358 sshd[4499]: pam_unix(sshd:session): session closed for user core Oct 2 19:17:40.568000 audit[4499]: USER_END pid=4499 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:40.574887 systemd[1]: sshd@7-139.178.70.108:22-86.109.11.97:52906.service: Deactivated successfully. Oct 2 19:17:40.575425 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:17:40.575560 kernel: audit: type=1106 audit(1696274260.568:1377): pid=4499 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:40.568000 audit[4499]: CRED_DISP pid=4499 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:40.577533 systemd-logind[1131]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:17:40.580825 kernel: audit: type=1104 audit(1696274260.568:1378): pid=4499 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:40.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-86.109.11.97:52906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:40.581395 systemd-logind[1131]: Removed session 10. Oct 2 19:17:42.572368 kubelet[2123]: E1002 19:17:42.572346 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" podUID="eefae4e2-4b80-4bdf-ae03-3570f94585da" Oct 2 19:17:43.970733 systemd[1]: run-containerd-runc-k8s.io-70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98-runc.P6J7L1.mount: Deactivated successfully. Oct 2 19:17:45.972084 systemd[1]: run-containerd-runc-k8s.io-75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af-runc.8nhUsF.mount: Deactivated successfully. Oct 2 19:17:45.989471 systemd[1]: run-containerd-runc-k8s.io-75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af-runc.nh4gFC.mount: Deactivated successfully. Oct 2 19:17:50.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-86.109.11.97:37284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.573822 systemd[1]: Started sshd@8-139.178.70.108:22-86.109.11.97:37284.service. Oct 2 19:17:50.574950 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:17:50.574992 kernel: audit: type=1130 audit(1696274270.572:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-86.109.11.97:37284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.618000 audit[4585]: USER_ACCT pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.619830 sshd[4585]: Accepted publickey for core from 86.109.11.97 port 37284 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:17:50.624621 kernel: audit: type=1101 audit(1696274270.618:1381): pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.623000 audit[4585]: CRED_ACQ pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.625831 sshd[4585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:17:50.630057 systemd[1]: Started session-11.scope. Oct 2 19:17:50.631538 systemd-logind[1131]: New session 11 of user core. Oct 2 19:17:50.631904 kernel: audit: type=1103 audit(1696274270.623:1382): pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.631975 kernel: audit: type=1006 audit(1696274270.623:1383): pid=4585 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 19:17:50.632001 kernel: audit: type=1300 audit(1696274270.623:1383): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff98804490 a2=3 a3=0 items=0 ppid=1 pid=4585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:50.623000 audit[4585]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff98804490 a2=3 a3=0 items=0 ppid=1 pid=4585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:50.637071 kernel: audit: type=1327 audit(1696274270.623:1383): proctitle=737368643A20636F7265205B707269765D Oct 2 19:17:50.623000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:17:50.634000 audit[4585]: USER_START pid=4585 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.642303 kernel: audit: type=1105 audit(1696274270.634:1384): pid=4585 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.642349 kernel: audit: type=1103 audit(1696274270.635:1385): pid=4587 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.635000 audit[4587]: CRED_ACQ pid=4587 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.733678 sshd[4585]: pam_unix(sshd:session): session closed for user core Oct 2 19:17:50.736399 systemd[1]: Started sshd@9-139.178.70.108:22-86.109.11.97:48586.service. Oct 2 19:17:50.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-86.109.11.97:48586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.740574 kernel: audit: type=1130 audit(1696274270.734:1386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-86.109.11.97:48586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.739000 audit[4585]: USER_END pid=4585 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.744646 kernel: audit: type=1106 audit(1696274270.739:1387): pid=4585 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.743000 audit[4585]: CRED_DISP pid=4585 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.745517 systemd[1]: sshd@8-139.178.70.108:22-86.109.11.97:37284.service: Deactivated successfully. Oct 2 19:17:50.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-86.109.11.97:37284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.746057 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:17:50.746801 systemd-logind[1131]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:17:50.747272 systemd-logind[1131]: Removed session 11. Oct 2 19:17:50.776000 audit[4596]: USER_ACCT pid=4596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.778556 sshd[4596]: Accepted publickey for core from 86.109.11.97 port 48586 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:17:50.778000 audit[4596]: CRED_ACQ pid=4596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.778000 audit[4596]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe67419e90 a2=3 a3=0 items=0 ppid=1 pid=4596 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:50.778000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:17:50.779838 sshd[4596]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:17:50.783686 systemd[1]: Started session-12.scope. Oct 2 19:17:50.783992 systemd-logind[1131]: New session 12 of user core. Oct 2 19:17:50.786000 audit[4596]: USER_START pid=4596 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:50.787000 audit[4599]: CRED_ACQ pid=4599 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.037749 systemd[1]: Started sshd@10-139.178.70.108:22-86.109.11.97:48600.service. Oct 2 19:17:51.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.108:22-86.109.11.97:48600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:51.039820 sshd[4596]: pam_unix(sshd:session): session closed for user core Oct 2 19:17:51.041000 audit[4596]: USER_END pid=4596 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.041000 audit[4596]: CRED_DISP pid=4596 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.046379 systemd[1]: sshd@9-139.178.70.108:22-86.109.11.97:48586.service: Deactivated successfully. Oct 2 19:17:51.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-86.109.11.97:48586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:51.047000 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:17:51.047759 systemd-logind[1131]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:17:51.048641 systemd-logind[1131]: Removed session 12. Oct 2 19:17:51.090000 audit[4606]: USER_ACCT pid=4606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.092508 sshd[4606]: Accepted publickey for core from 86.109.11.97 port 48600 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:17:51.091000 audit[4606]: CRED_ACQ pid=4606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.091000 audit[4606]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff385420f0 a2=3 a3=0 items=0 ppid=1 pid=4606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:51.091000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:17:51.093705 sshd[4606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:17:51.097633 systemd[1]: Started session-13.scope. Oct 2 19:17:51.097806 systemd-logind[1131]: New session 13 of user core. Oct 2 19:17:51.101000 audit[4606]: USER_START pid=4606 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.102000 audit[4609]: CRED_ACQ pid=4609 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.212619 sshd[4606]: pam_unix(sshd:session): session closed for user core Oct 2 19:17:51.211000 audit[4606]: USER_END pid=4606 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.211000 audit[4606]: CRED_DISP pid=4606 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:17:51.214415 systemd[1]: sshd@10-139.178.70.108:22-86.109.11.97:48600.service: Deactivated successfully. Oct 2 19:17:51.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.108:22-86.109.11.97:48600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:51.214865 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:17:51.215264 systemd-logind[1131]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:17:51.215850 systemd-logind[1131]: Removed session 13. Oct 2 19:17:51.572306 env[1138]: time="2023-10-02T19:17:51.572271684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:51.819955 env[1138]: time="2023-10-02T19:17:51.819728336Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:51.820218 env[1138]: time="2023-10-02T19:17:51.820163751Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:51.820386 kubelet[2123]: E1002 19:17:51.820361 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:51.820582 kubelet[2123]: E1002 19:17:51.820399 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:51.820582 kubelet[2123]: E1002 19:17:51.820473 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hj9lr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-6bfffd4bc9-pjmrw_calico-apiserver(d2dae848-533d-46eb-9140-9a656cc80427): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:51.820582 kubelet[2123]: E1002 19:17:51.820500 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" podUID="d2dae848-533d-46eb-9140-9a656cc80427" Oct 2 19:17:52.572691 env[1138]: time="2023-10-02T19:17:52.572600799Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:17:52.805012 env[1138]: time="2023-10-02T19:17:52.804948857Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:52.805298 env[1138]: time="2023-10-02T19:17:52.805275666Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:52.805466 kubelet[2123]: E1002 19:17:52.805452 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:52.805571 kubelet[2123]: E1002 19:17:52.805562 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:52.805715 kubelet[2123]: E1002 19:17:52.805705 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-l8hvd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-s9jtb_calico-system(a749925a-c070-43fd-ae04-bc4172f6bc97): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:52.806408 env[1138]: time="2023-10-02T19:17:52.806389890Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:17:53.047226 env[1138]: time="2023-10-02T19:17:53.047180406Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:53.047523 env[1138]: time="2023-10-02T19:17:53.047502423Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:53.047669 kubelet[2123]: E1002 19:17:53.047650 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:53.047877 kubelet[2123]: E1002 19:17:53.047692 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:53.047877 kubelet[2123]: E1002 19:17:53.047756 2123 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-l8hvd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-s9jtb_calico-system(a749925a-c070-43fd-ae04-bc4172f6bc97): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:53.047877 kubelet[2123]: E1002 19:17:53.047789 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-s9jtb" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" Oct 2 19:17:53.968193 systemd[1]: run-containerd-runc-k8s.io-70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98-runc.QC8DhS.mount: Deactivated successfully. Oct 2 19:17:55.572696 env[1138]: time="2023-10-02T19:17:55.572661004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:55.807781 env[1138]: time="2023-10-02T19:17:55.807745228Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:55.817384 env[1138]: time="2023-10-02T19:17:55.817354698Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:55.817614 kubelet[2123]: E1002 19:17:55.817599 2123 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:55.817794 kubelet[2123]: E1002 19:17:55.817626 2123 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:55.817794 kubelet[2123]: E1002 19:17:55.817688 2123 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wtqds,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-6bfffd4bc9-9hhs5_calico-apiserver(eefae4e2-4b80-4bdf-ae03-3570f94585da): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:55.817794 kubelet[2123]: E1002 19:17:55.817713 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" podUID="eefae4e2-4b80-4bdf-ae03-3570f94585da" Oct 2 19:17:55.975876 systemd[1]: run-containerd-runc-k8s.io-75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af-runc.VFQlIn.mount: Deactivated successfully. Oct 2 19:17:55.993146 systemd[1]: run-containerd-runc-k8s.io-75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af-runc.ufTrUq.mount: Deactivated successfully. Oct 2 19:18:01.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.108:22-86.109.11.97:52308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.216196 systemd[1]: Started sshd@11-139.178.70.108:22-86.109.11.97:52308.service. Oct 2 19:18:01.217092 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:18:01.217128 kernel: audit: type=1130 audit(1696274281.214:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.108:22-86.109.11.97:52308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.408000 audit[4693]: USER_ACCT pid=4693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.410162 sshd[4693]: Accepted publickey for core from 86.109.11.97 port 52308 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:18:01.413563 kernel: audit: type=1101 audit(1696274281.408:1408): pid=4693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.412000 audit[4693]: CRED_ACQ pid=4693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.414291 sshd[4693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:01.419077 kernel: audit: type=1103 audit(1696274281.412:1409): pid=4693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.419136 kernel: audit: type=1006 audit(1696274281.412:1410): pid=4693 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 2 19:18:01.419152 kernel: audit: type=1300 audit(1696274281.412:1410): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedf6c8e80 a2=3 a3=0 items=0 ppid=1 pid=4693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:01.412000 audit[4693]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedf6c8e80 a2=3 a3=0 items=0 ppid=1 pid=4693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:01.422469 kernel: audit: type=1327 audit(1696274281.412:1410): proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:01.412000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:01.421221 systemd[1]: Started session-14.scope. Oct 2 19:18:01.422116 systemd-logind[1131]: New session 14 of user core. Oct 2 19:18:01.424000 audit[4693]: USER_START pid=4693 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.429557 kernel: audit: type=1105 audit(1696274281.424:1411): pid=4693 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.429594 kernel: audit: type=1103 audit(1696274281.425:1412): pid=4695 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.425000 audit[4695]: CRED_ACQ pid=4695 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.522537 sshd[4693]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:01.522000 audit[4693]: USER_END pid=4693 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.525073 systemd-logind[1131]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:18:01.525924 systemd[1]: sshd@11-139.178.70.108:22-86.109.11.97:52308.service: Deactivated successfully. Oct 2 19:18:01.526396 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:18:01.527658 systemd-logind[1131]: Removed session 14. Oct 2 19:18:01.522000 audit[4693]: CRED_DISP pid=4693 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.531304 kernel: audit: type=1106 audit(1696274281.522:1413): pid=4693 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.531380 kernel: audit: type=1104 audit(1696274281.522:1414): pid=4693 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:01.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.108:22-86.109.11.97:52308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:03.571394 kubelet[2123]: E1002 19:18:03.571371 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-pjmrw" podUID="d2dae848-533d-46eb-9140-9a656cc80427" Oct 2 19:18:03.969863 systemd[1]: run-containerd-runc-k8s.io-70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98-runc.GNagq7.mount: Deactivated successfully. Oct 2 19:18:05.572241 kubelet[2123]: E1002 19:18:05.572225 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-s9jtb" podUID="a749925a-c070-43fd-ae04-bc4172f6bc97" Oct 2 19:18:05.976706 systemd[1]: run-containerd-runc-k8s.io-75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af-runc.luDTd2.mount: Deactivated successfully. Oct 2 19:18:05.992009 systemd[1]: run-containerd-runc-k8s.io-75416cdb04d04609e504b1ca2cc7d106021a85398b2bc6760e360c32cc7ea4af-runc.oOTBAy.mount: Deactivated successfully. Oct 2 19:18:06.572641 kubelet[2123]: E1002 19:18:06.572612 2123 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6bfffd4bc9-9hhs5" podUID="eefae4e2-4b80-4bdf-ae03-3570f94585da" Oct 2 19:18:11.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-86.109.11.97:51712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.525077 systemd[1]: Started sshd@12-139.178.70.108:22-86.109.11.97:51712.service. Oct 2 19:18:11.526068 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:18:11.526103 kernel: audit: type=1130 audit(1696274291.523:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-86.109.11.97:51712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.669000 audit[4779]: USER_ACCT pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.671632 sshd[4779]: Accepted publickey for core from 86.109.11.97 port 51712 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:18:11.673000 audit[4779]: CRED_ACQ pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.677442 sshd[4779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:11.677845 kernel: audit: type=1101 audit(1696274291.669:1417): pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.677880 kernel: audit: type=1103 audit(1696274291.673:1418): pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.677899 kernel: audit: type=1006 audit(1696274291.673:1419): pid=4779 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:18:11.673000 audit[4779]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe33008400 a2=3 a3=0 items=0 ppid=1 pid=4779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:11.682959 kernel: audit: type=1300 audit(1696274291.673:1419): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe33008400 a2=3 a3=0 items=0 ppid=1 pid=4779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:11.682990 kernel: audit: type=1327 audit(1696274291.673:1419): proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:11.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:11.684525 systemd[1]: Started session-15.scope. Oct 2 19:18:11.684856 systemd-logind[1131]: New session 15 of user core. Oct 2 19:18:11.686000 audit[4779]: USER_START pid=4779 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.687000 audit[4781]: CRED_ACQ pid=4781 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.694586 kernel: audit: type=1105 audit(1696274291.686:1420): pid=4779 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.694616 kernel: audit: type=1103 audit(1696274291.687:1421): pid=4781 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.805606 sshd[4779]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:11.805000 audit[4779]: USER_END pid=4779 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.808183 systemd[1]: sshd@12-139.178.70.108:22-86.109.11.97:51712.service: Deactivated successfully. Oct 2 19:18:11.808764 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:18:11.810582 kernel: audit: type=1106 audit(1696274291.805:1422): pid=4779 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.805000 audit[4779]: CRED_DISP pid=4779 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.811227 systemd-logind[1131]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:18:11.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-86.109.11.97:51712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.814683 kernel: audit: type=1104 audit(1696274291.805:1423): pid=4779 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:18:11.814495 systemd-logind[1131]: Removed session 15. Oct 2 19:18:13.968752 systemd[1]: run-containerd-runc-k8s.io-70dcfb503964d9a937a6d9d8bd1c1fcd4a861f32805cb764cfd207ac850a1e98-runc.FxiFLW.mount: Deactivated successfully.